A group of experts was brought together for a virtual roundtable to better understand how child trafficking for sexual purposes and child sexual exploitation and abuse online overlap; and to explore the opportunities, challenges, and implications of framing some online exploitation crimes as a form of trafficking.
The fast-changing pace of technology across the world presents challenges for those interpreting laws and trying to prevent the exploitation and abuse of children in a digital age. How this issue is framed and defined will have important consequences for children and their protection. Therefore, it is vital that further work is done to better understand the evolving nature of online- facilitated exploitation, abuse and trafficking – and the implications for law, policy and practice. Based on the evidence and the roundtable discussion, WeProtect Global Alliance makes the following key recommendations:
Improved legal clarity: Legal and policy reform should be explored to help improve legal clarity in cases of child trafficking and wider offences of child sexual exploitation and abuse that have an online element.
Conduct further research and data to scope the specific gaps, challenges, and good practices referenced at the event: A review of current practice and legislation relating to child trafficking and child sexual exploitation and abuse online, which includes an analysis of restitution, compensation, sentencing and victim support, could provide better data at country level on what works best for children in terms of protection, prevention and justice against sexual offences and trafficking.
Strengthen child protection systems: A child protection response that puts the child’s best interests first is the most important element when a sexual crime has been committed against a child. Improved resourcing of the systems can ensure an improved multi-agency response to child victims of online sexual offences and trafficking.
Increase priority and funding: More political will and resourcing is required to raise the profile of child sexual exploitation and abuse online and to generate the funding necessary to tackle it, including training law enforcement on preserving and presenting evidence in cases with a cyber element.
Our website uses cookies to give you the best experience.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Please note:
This action will also remove this member from your connections and send a report to the site admin.
Please allow a few minutes for this process to complete.