Young People, Crime and Community Safety: engagement and early intervention Australian Institute of Criminology International Conference

Size: px
Start display at page:

Download "Young People, Crime and Community Safety: engagement and early intervention Australian Institute of Criminology International Conference"

Transcription

1 Young People, Crime and Community Safety: engagement and early intervention Australian Institute of Criminology International Conference RACV Club, Melbourne, Australia February 2008 CONFERENCE PAPER: Cyber crime and safety for youth and other vulnerable groups Chris O Connor Detective Senior Sergeant Victoria Police

2 Cyber crime and safety for youth and other vulnerable groups Chris O Connor Detective Senior Sergeant Victoria Police Anything that illegally threatens the psychological, emotional or physical wellbeing of our children and young people is the business of police forces and other relevant agencies. The focus of this presentation will be online child sexual exploitation - but it can be equally applied to all online activity. I do not profess to have the answers but I do propose to highlight the unique nature of the threats to our children that exist via online communications. The evolution of the online services has challenged all industries to re-assess the way they do business. This is particularly pertinent to the child protection and law enforcement industries because although offline and online offending amount to the same result the potential for online offending is unimaginably magnified. In the current world environment no number of police or laws will eradicate the criminality through traditional means. However, innovative approaches, cooperation and inter industry partnerships involving government, non government, children, young people, parents and the community will. That is not to say law enforcement in this state, country and globally is not making inroads. There are partnerships between internet service providers, software manufacturers, telcos and law enforcement. Indeed there are partnerships between non government bodies, government bodies, industry and the community. But many of these partnerships are localised, single focussed and heterogenous. The online services are unique and as such criminal activities online are carried out using unique methods. By extension unique crimes require unique solutions! The 2006 Australian Census identified, 58% per cent of Australian homes had an internet connection 43% of Melbourne households with broadband connection (AAP, 2007). 1

3 In 2005, the (then) Australian Broadcasting Authority and NetAlert Ltd, commissioned a report into the behaviours and attitudes of home internet use. Both parents and children were surveyed. Key findings from the report were 37% per cent of children accessed the Internet on a daily basis 33% accessed it two to three times per week. Just over one-third of young children (8-9 years) nominated first using the internet between 5-6 years of age. The largest proportion of children aged 12 or 13 years nominated they first accesses the internet at 9-10 years (ABA, 2005). The end result is that more children are accessing the online services at younger ages than ever before research in the United Kingdom highlights that, 75% of children have internet in their home; 92% of children have internet at school; 57% of the 9-19 years who go online once a week have come into contact with online pornography; 33% of daily and weekly child users have received unwanted sexual comments online.(powell: 2007) Children and young people are, by definition, vulnerable to the behaviours and practices of adults. For these reasons our society imposes age restrictions and constraints on access to adult activities such as possession and consumption of alcohol, vehicle driver licensing, film classification, property ownership and voting rights to name a few. Many of these restraints are an acknowledgement that somewhat arbitrarily, children and young people do not have the required developmental, emotional and social capacities to make appropriately informed decisions. Complementing these restraints are formal and informal educational processes and support designed to prepare children and young people to make appropriately informed decisions. Traditional child protective practices and programs acknowledge the role of parents and significant adult role models in the positive development of children. Traditionally, many threats have been constant and their containment well suited to both didactic and experiential learning programs. Risk assessment and management of threats such as personal safety when in public, on transport, in recreational activity and respect for other people s property, beliefs and lifestyles and so forth have been the primary responsibility of parents, supplemented by the education system, other government bodies, community, religious and recreational non government bodies. To this point you may be thinking that I am presenting on the topic of sociology 101. What does this all have to do with the safety of children when online? The point I wish to make is that traditionally our society has evolved 2

4 ordered and well structured processes focussed on the healthy development of our children that prepares them to make appropriate decisions for their age. The advent of the online generation has challenged those ordered and well structured processes. Like me most of you are involved in organisations committed to the maintenance and protection of our young people s wellbeing. And like me many of you are either publicly or privately incensed that our generation allowed the unrestricted development of information and communication technologies with little consideration for the sociological implications. Risks to vulnerable children and young people have always been extreme but the online services have created environments where all children and young people are at risk. In many ways the technical and experiential knowledge needed to navigate cyberspace is in the hands of our young people sometimes to the exclusion of their parents. In this regard parenting is desperate for help. That help has come in the form of school, government and non government programs designed to empower and protect children on and offline. But away from the school intranet children are once again at risk when online. The intent of these programs is that the knowledge gained will reinforce protective values and behaviours in the child. But if a child has low self-esteem or from a disadvantaged, dysfunctional or abusive home environment then that person is at extreme risk. But really, no child is immune; all are at some degree of risk for example children own and use game consoles, mobile phones and other devices that have internet connectivity that can be accessed in the privacy of their own bedroom or accessible with and through friends and associates. Existing threats to the balanced development of our children come in the forms of photographs, movies, text, audio, drawings and any other type of visual imagery representative of:- adult erotica/pornography and associated deviant sexual behaviour child erotica/pornography and associated deviant sexual behaviour incest, rape and associated deviant sexual behaviour scenes of real human execution graphic scenes of real and choreographed physical violence explicit medical procedures scenes of mob violence graphic accident scenes bullying 3

5 racial vilification religious vilification personal vilification backyard chemistry covering anything from improvised explosive devices to illicit drug and alcohol manufacture web sites and forums that, intentionally or otherwise, act to reinforce or legitimise the deviant or abusive behaviour. Well! Are these threats more real for the current generation of young people than previous generations? They are without question! I make several suggestions for this. They are:- Production access Product content and control Market size and ease of access PRODUCTION ACCESS The ease of access and use of graphic and web hosting software has enabled any user to produce online material as professionally as if it were commercially constructed. The online services have provided the vehicle to give unparalleled voice and power to individuals and philosophies that previously existed underground or had little access to the mainstream community. PRODUCT CONTENT and CONTROL The content of websites, social network and discussion sites are only subjected to limited censorship, control or moderation. Communication globalization has greatly compounded the difficulty in prosecuting the hosting of illegal content or censoring inappropriate content. MARKET SIZE and EASE of ACCESS Market size equates to a potential audience of all users of online services. The ease with which most products can be accessed is relatively unrestrained. Even pay-for-view websites offer samples and free tours of sites sufficient to show the user the type of material enclosed. HOW ARE YOUNG PEOPLE INTRODUCED TO THESE THREATS? Net Psychology The internet has its own language, behaviour and psychology. It is the world of shortcuts. The English language is abbreviated, coded and iconised. All designed to express thoughts succinctly and in the quickest 4

6 time. Have you ever watched a young person text messaging on their mobile phone. Their thumb is in constant express motion; or the speed and accuracy of their keyboard skills when chatting with online friends. All highly skilled and all self taught. If only they had learn their times tables or grammar with such commitment! But it is that very skill that threatens their protection. Much about the internet is speed and now, speed and now. There is often so much going on that you feel you do not have time to think clearly. You may well be carrying on several discussions with numerous users in difference groups, all at once. Such activity comes with high cognitive demand. And you may find yourself typing or saying something you do not really mean or to be cool or to keep that person talking to you. Net psychology equates to the tenet I want it and I want it now. Vulnerable status The natural vulnerable status of children is compounded when online for several reasons. The spontaneity of face to face communication with its body language, voice pitch and inflection, eye contact, conversation content all provide us with a solid basis to make a value judgement about continuing communication with another person. Much of that is missing in online communications, even with webcam and VOIP. Children and young people with low self-esteem, self-respect or self-worth may not value their bodies and be prepared to give it to someone else in return for emotional or material support. It is not uncommon, in such circumstances for a child to enter an online relationship knowing or suspecting that the other person is several times their age. Offender behaviour A common ingredient of child sexual assault offending is the manipulation of a child designed to seduce the child into sexual activity and/or ensure the child s silence. This grooming process focuses on the weaknesses that are a child s wants, needs, emotions and underdeveloped concepts of trust and self. Child molesters develop skills and behaviours that make them appealing to children. They identify with children, are non judgemental, respond to wants and generally communicate at the child s level. Some provide material goods and environments pleasing to children. In essence they are skilled at identifying potential victims. Such children are often ill equipped emotionally to combat the grooming process. Some of the offending dynamics have changed as well. People who, prior to the online services, would not have acted on child focussed sexual fantasies because of legal sanctions, access to material or fear of apprehension, are now also at extreme risk of offending. 5

7 The person who formerly reframed from acting on his fantasies is now at extreme risk of offending. New types of offenders have emerged. One is the person who trawls for child pornography and abuse material. Whose motivation is not contact offences but to satisfy masturbatory fantasies by collecting and cataloguing large quantities of material. Another type is the offender who satisfies his fantasies by seducing children whilst online and engaged in sexual discussion and variations of cyber sex. No men that we have arrested for these types of behaviour could guarantee they would not have committed a contact offence of a child had been available. That is the compounding threat of these types of behaviour. THREAT LOCATIONS CHAT ROOMS DISCUSSION GROUPS SOCIAL NETWORKING SITES ONLINE GAMING VIRTUAL WORLDS MOBILE PHONE and WIRELESS TECHNOLOGIES CHATROOMS, DISCUSSION GROUPS and SOCIAL NETWORKING SITES Live real time text/voip or Webcam access to any other user anywhere on the globe. File transfers/sharing of any audio visual product. Subjects that cover the whole range of human thought. The opportunity to post very personal information. Release of information such as school, names of friends, hobbies, sports played, favourite music, likes and dislikes; just the sort of information online offenders use to comment the grooming process with a prospective victim. ONLINE GAMING The popular gaming consoles such as Xbox, Playstation and Nintendo Wii are all internet-abled and can function similarly to desktops or laptops. They each have live chat function enabling communication with other players via text, video or voice technologies as well as the ability to share files. VIRTUAL WORLD The virtual world is a computer-based virtual environment that simulates or replicates the real world such as Second Life, Red Light Centre and World of Warcraft. 6

8 There are a number of virtual worlds and like most online activities access varies from free to credit card based. These virtual worlds allow users to be whom they want and behave in any way they want. They are adult worlds and sex is a key element. The only real security against young people under that age of 18 entering them is if they give their correct date of birth when registering. Virtual Worlds also provide for communication between users via chat and file sharing. Although credit card payments determine movement of users to more sexually focussed areas young people are still at extreme risk to online sex predators and sexually deviant behaviour. MOBILE PHONES and WIRELERSS TECHNOLOGY This next generation of mobile phones are virtual mobile internet connections. Camera and video quality is continuously improving as is speed, storage and general use. These are unique times of unique crimes that require unique responses from our community. The internationalisation of communication insists that a national approach to child protection as it applies to information and communication technology is a necessary requirement if we wish to minimise the risks. WHAT CAN BE DONE? BIOMETRICS Being in Law Enforcement I am in a position to observe from the sidelines. It has been my experience that nationally, the child protection industry, in relation to information and communication technology, is somewhat heterogeneous. 7

9 NATIONAL BODY representative of all child focussed and relevant bodies accepted as providing standard programs for child protection and empowerment. There maybe existing bodies that could take on this l 8

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

9. Children, Technology and Gambling

9. Children, Technology and Gambling 9. Children, Technology and Gambling This document is part of a series of Building a Stronger South Australia policy initiatives from the Government of South Australia. 1. Future Fund 2. Jobs and Skills

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY

GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY GYMNASTICS NSW PHOTOGRAPHY ACQUIRING AND DISPLAYING IMAGES OF CHILDREN POLICY POLICY NAME: DATE OF ISSUE: POLICY COVERAGE: DATE OF REVIEW: CONTROLLING BODY: Gymnastics NSW Photography Acquiring and Displaying

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

safety and the internet

safety and the internet www.kidsintheknow.ca A parent's guide for children ages 8 & 9 safety and the internet This brochure is intended to help you improve your child s safety on the Internet. It includes information about children

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Ingle Farm East Primary School

Ingle Farm East Primary School Ingle Farm East Primary School Cyber-Safety Policy Endorsed by Governing Council on AUGUST, 2015 Review date AUGUST, 2018 Overview Measures to ensure the cyber-safety of Ingle Farm East Primary School

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

Example of a Child Protection Policy

Example of a Child Protection Policy Example of a Child Protection Policy Introduction Policy Statement/aims Promoting good practice Good practice guidelines Use of photographic/filming equipment Recruitment and training of staff and volunteers

More information

ORGANIZATIONAL STRUCTURE, MANAGEMENT AND POLICIES OF QUEENSLAND POLICE INVOLVED WITH CHILD PROTECTION INVESTIGATIONS

ORGANIZATIONAL STRUCTURE, MANAGEMENT AND POLICIES OF QUEENSLAND POLICE INVOLVED WITH CHILD PROTECTION INVESTIGATIONS ORGANIZATIONAL STRUCTURE, MANAGEMENT AND POLICIES OF QUEENSLAND POLICE INVOLVED WITH CHILD PROTECTION INVESTIGATIONS Detective Superintendent John Reilly State Crime Operations Command Queensland Police

More information

Devon Safeguarding Children s Board Child Sexual Exploitation Risk Assessment Tool v. 12/11/15

Devon Safeguarding Children s Board Child Sexual Exploitation Risk Assessment Tool v. 12/11/15 Devon Safeguarding Children s Board Child Sexual Exploitation Risk Assessment Tool v. 12/11/15 What is Child Sexual Exploitation? See Barnados Puppet on a String for more guidance http://www.barnardos.org.uk/ctf_puppetonastring_report_final.pdf

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

The Family Violence Protection Act 2008

The Family Violence Protection Act 2008 Law Enforcement Client Newsletter The Family Violence Protection Act 2008 October 2008 The Family Violence Protection Act 2008 (the Act) was assented to on 23 September 2008. The Act is not yet in effect.

More information

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL CYBERSAFETY USE AGREEMENT FOR STUDENTS 2014 This document consists of a cover page and three sections: Section A Cybersafety In The School Environment Important

More information

Southfields Academy: Safeguarding Principles

Southfields Academy: Safeguarding Principles Southfields Academy: Safeguarding Principles Author: Jacqueline Valin, Principal Date: 9 th October 2015 Review: Annually Reviewed by: Board of Trustees Committee / Delegated to Principal/Headteacher Safeguarding

More information

Co-regulatory scheme for Internet content:

Co-regulatory scheme for Internet content: Joint meeting of Council of Australian University Directors (CAUDIT) and Council of Australian University Librarians (CAUL) Adelaide 10 March 2000 Co-regulatory scheme for Internet content: Operation of

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.

Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community. Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to

More information

E-Safety Policy (Parent/Pupil) March 2013

E-Safety Policy (Parent/Pupil) March 2013 E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils

More information

TAFE SA Student Alcohol and Other Drug Policy Under the umbrella of Drugs and Alcohol Policy (DFEEST OHS&IM 026)

TAFE SA Student Alcohol and Other Drug Policy Under the umbrella of Drugs and Alcohol Policy (DFEEST OHS&IM 026) TAFE SA Student Alcohol and Other Drug Policy Under the umbrella of Drugs and Alcohol Policy (DFEEST OHS&IM 026) 1. Purpose of the policy The purpose of the Student Alcohol and Other Drug Policy is to

More information

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between

More information

Virginia Primary School Learning Together, Learning for our Future

Virginia Primary School Learning Together, Learning for our Future Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

The support you should get if you are a victim of crime

The support you should get if you are a victim of crime The support you should get if you are a victim of crime This is an EasyRead booklet showing you what to do. About this booklet The Ministry of Justice wrote this information. This is an EasyRead guide

More information

Providing support to vulnerable children and families. An information sharing guide for registered school teachers and principals in Victoria

Providing support to vulnerable children and families. An information sharing guide for registered school teachers and principals in Victoria Providing support to vulnerable children and families An information sharing guide for registered school teachers and principals in Victoria Service Coordination Tool Templates 2006 reference guide Providing

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Youth Protection Training

Youth Protection Training B O Y S C O U T S O F A M E R I C A Youth Protection Training For Volunteer Leaders and Parents Facilitator s Guide The Boy Scouts of America deeply appreciates your leadership in facilitating this session

More information

Years 3-7 Acceptable Use Policy & Agreement

Years 3-7 Acceptable Use Policy & Agreement Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

GUIDANCE. USING IMAGES OF CHILDREN: PHOTOGRAPHS, VIDEOS, WEBSITES & WEBCAMS March 2007

GUIDANCE. USING IMAGES OF CHILDREN: PHOTOGRAPHS, VIDEOS, WEBSITES & WEBCAMS March 2007 GUIDANCE USING IMAGES OF CHILDREN: PHOTOGRAPHS, VIDEOS, WEBSITES & WEBCAMS March 2007 Using Images of Children Page 1 February 2007 USING IMAGES OF CHILDREN: PHOTOGRAPHS, VIDEOS, WEBSITES & WEBCAMS Introduction

More information

Sexual Offences Definitive Guideline DEFINITIVE GUIDELINE

Sexual Offences Definitive Guideline DEFINITIVE GUIDELINE Sexual Offences Definitive Guideline DEFINITIVE GUIDELINE Contents Applicability of guideline 7 Rape and assault offences 9 Rape 9 Sexual Offences Act 2003 (section 1) Assault by penetration 13 Sexual

More information

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN (quotation from a Mazocruz woman from Puno, Peru)

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN (quotation from a Mazocruz woman from Puno, Peru) Design by Ultimatum Design Legal rights and help for those who are subjected to criminal acts in Norway If you have been subjected to criminal acts in the form of physical and/or psychological violence,

More information

Sexting the High Tech Crime Prevention Function

Sexting the High Tech Crime Prevention Function Parliament of Victoria Law Reform Committee Inquiry into Sexting AFP Submission June 2012 1 P age AUSTRALIAN FEDERAL POLICE SUBMISSION TO THE INQUIRY INTO SEXTING Introduction The AFP welcomes the opportunity

More information

Violence against women: key statistics

Violence against women: key statistics Violence against women: key statistics Research from the 2012 ABS Personal Safety Survey and Australian Institute of Criminology shows that both men and women in Australia experience substantial levels

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information

Study of the Violent Nature of Crime in South Africa Creating a violence free society

Study of the Violent Nature of Crime in South Africa Creating a violence free society Study of the Violent Nature of Crime in South Africa Creating a violence free society Presentation by the Centre for the Study of Violence and Reconciliation, at a press briefing of the Justice, Crime

More information

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN. (quotation from a Mazocruz woman from Puno, Peru)

NOBODY KNOWS WHAT S HAPPENING IN MY HOUSE. I M THE ONLY ONE WHO CAN FEEL MY PAIN. (quotation from a Mazocruz woman from Puno, Peru) Legal rights and help for those who are subjected to criminal acts in Norway If you have been subjected to criminal acts in the form of physical and/or psychological violence, sexual abuse, forced marriage,

More information

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY Our setting will work with children, parents and the community to ensure the rights and safety of children and to give them the very best start in life.

More information

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life VEA Bringing Learning to Life Program Support Notes Junior - Senior Secondary Keeping Safe Online 24 mins Program Support Notes by Belinda Kime, App Sci (Home Ec)/Ed (Sec) Produced by VEA Pty Ltd Commissioning

More information

Settlement Worker Training - Learn the Basics of Settled & Safe

Settlement Worker Training - Learn the Basics of Settled & Safe Settled & Safe TRAINING MATERIALS DAY TWO 1 CONTENTS SETTLEMENT WORKER TRAINING TRAINING MATERIALS DAY TWO 2 About this training 2 Information not advice 2 Victoria Legal Aid services 2 Activity: Reflections

More information

Walking a Tightrope. Alcohol and other drug use and violence: A guide for families. Alcohol- and Other Drug-related Violence

Walking a Tightrope. Alcohol and other drug use and violence: A guide for families. Alcohol- and Other Drug-related Violence Walking a Tightrope Alcohol and other drug use and violence: A guide for families Alcohol- and Other Drug-related Violence Alcohol and other drug use and family violence often occur together. Families

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

www.islington.gov.uk/tradingstandards An essential guide to age-restricted products

www.islington.gov.uk/tradingstandards An essential guide to age-restricted products www.islington.gov.uk/tradingstandards An essential guide to age-restricted products Preventing sales of age restricted products to young people is important both for their health and safety and for that

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

The Psychology of a Cyber Predator;

The Psychology of a Cyber Predator; The Psychology of a Cyber Predator; Decoding the Deviate Mind Janice Niederhofer Peerage Consulting, Inc. Session ID: HT1-203 Session Classification: Intermediate Agenda Traits and characteristics Psychological

More information

All photographers and staff at Success Photography must ensure that:

All photographers and staff at Success Photography must ensure that: Child Protection Policy All photographers and staff at Success Photography must ensure that: The welfare of the child is paramount. All children, whatever their age, culture, disability, gender, language,

More information

The rules you have to follow when you are on Licence

The rules you have to follow when you are on Licence The rules you have to follow when you are on Licence Information taken from: PI 20/2012 & PSI 40/2012 Licences and Licence Conditions Annex A Developed and illustrated by www.changepeople.co.uk 1 Anyone

More information

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the

More information

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268 This guidance is suitable for Public Disclosure Owner of Doc:

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Child Protection Policy for African Impact and The Happy Africa Foundation

Child Protection Policy for African Impact and The Happy Africa Foundation Child Protection Policy for African Impact and The Happy Africa Foundation Safeguarding children is the responsibility of everyone. Introduction to our Child Protection Policy Page 2 Policy Statement Page

More information

School Bullying and the Law in the Republic of Ireland David Quirke BA, LLM

School Bullying and the Law in the Republic of Ireland David Quirke BA, LLM School Bullying and the Law in the David Quirke BA, LLM CONTENTS 1. Introduction. 2. The Role of the School.. 3. Criminal Law 4. Civil Law. 5. Cyber-Bullying... 6. Children s Rights 7. Conclusion. Introduction

More information

Georgia Performance Standards. Health Education

Georgia Performance Standards. Health Education HIGH SCHOOL Students in high school demonstrate comprehensive health knowledge and skills. Their behaviors reflect a conceptual understanding of the issues associated with maintaining good personal health.

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

Sexual Assault of a Child VOIR DIRE QUESTIONS

Sexual Assault of a Child VOIR DIRE QUESTIONS ATTORNEYS Sexual Assault of a Child VOIR DIRE QUESTIONS 1. What are your feelings or opinions about criminal defense attorneys? 2. Have you ever had a bad experience with a criminal defense attorney? If

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by:

NAPCAN s strategy is to bring about the changes necessary in individual and community behaviour to stop child abuse and neglect before it starts by: The Director Cyber Safety Policy and Programs Department of Communications GPO Box 2154 CANBERRA ACT 2601 Dear Director, Re: Discussion Paper on Enhancing Online Safety for Children NAPCAN (National Association

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

Court, School and Law Enforcement Collaborative Task Force: Guidelines for Schools in Contacting Law Enforcement Appendix A

Court, School and Law Enforcement Collaborative Task Force: Guidelines for Schools in Contacting Law Enforcement Appendix A A: Aggravated Assault Alcohol Armed Robbery Arson, of an occupied structure Arson, of a structure or property(not occupied) Assault B: Bomb Threat Bullying Burglary/ Breaking & Entering (2 nd & 3 rd Degree)

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011

PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011 1.0 About this Procedure This procedure details the process officers must follow concerning the use of the provisions contained within 30A to 30D of Police and Criminal Evidence Act 1984 in relation to

More information

Appendix 6.1. The Person Posing A Risk To Children Assessment Framework

Appendix 6.1. The Person Posing A Risk To Children Assessment Framework Appendix 6.1 The Person Posing A Risk To Children Assessment Framework Introduction and guidance notes (PPRTC Assessment Framework) A Home Office Review of Schedule 1 in 2004 identified that the term Schedule

More information

Nower Hill High School

Nower Hill High School Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

e-safety Policy Broadclyst Community Primary School

e-safety Policy Broadclyst Community Primary School e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy

More information

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues

Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1. VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk. Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 1 VISIT THE NUT HEALTH AND SAFETY POST www.teachers.org.uk Camera Mobile Phones Health and Safety Issues Mobiles - 4480 1/3 A4 3/14/06 2:54 PM Page 2 To view

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-SAFETY SOCIAL MEDIA GUIDANCE

E-SAFETY SOCIAL MEDIA GUIDANCE E-SAFETY SOCIAL MEDIA GUIDANCE for those who work with Children, Young People and Adults who may be at risk 1 Contents What do we mean by Social Media... 3 Introduction... 3 Background... 3 Legal Consequences...

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

BANK VIEW HIGH SCHOOL

BANK VIEW HIGH SCHOOL BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

1.1 Full name: Social Work Practitioner Youth Justice

1.1 Full name: Social Work Practitioner Youth Justice CPD sample profile 1.1 Full name: Social Work Practitioner Youth Justice 1.2 Profession: Social Worker 1.3 Registration number: SWXXXX 2. Summary of recent work / practice I work as a front line social

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Responsible use of ICT Devices Agreement

Responsible use of ICT Devices Agreement Responsible use of ICT Devices Agreement This document is comprised of this cover page and three sections: Section A: Section B: Section C: Introduction Cybersafety Rules for Junior Primary Students Cybersafety

More information

SafeMinistryTraining.com.au Course Notes

SafeMinistryTraining.com.au Course Notes SafeMinistryTraining.com.au Course Notes 1. Introduction Welcome to the Safe Ministry Training course. We all want our churches to be safe places for everyone kids as well as adults. The purpose of this

More information

ef*f Children and Parents: Media Use and Attitudes Report

ef*f Children and Parents: Media Use and Attitudes Report ef*f Children and Parents: Media Use and Attitudes Report Research Document Publication date: October About this document This report examines children s media literacy. It provides detailed evidence on

More information

Australian Association of Social Workers Incorporated in the ACT ACN 008 576 010 ABN 93 008 576 010. Domestic and Family Violence Position Paper

Australian Association of Social Workers Incorporated in the ACT ACN 008 576 010 ABN 93 008 576 010. Domestic and Family Violence Position Paper Introduction: The Social Work Platform The social work profession is committed to maximising the well being of individuals and society. It considers that individual and societal wellbeing is underpinned

More information

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police

Department of Communications. Enhancing Online Safety for Children Discussion Paper. Submission by the Australian Federal Police Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

More information

Online grooming: What changes with the new legislation?

Online grooming: What changes with the new legislation? Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM:

THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM: CAPACITY BUILDING SEMINAR ON: THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM: Holiday Hotel Sihanoukville, Kingdom of Cambodia April 22 & 23, 2010 Organized by: With Funding Support From:

More information