Top

1.4.2 Abusive Images of Children and Information Communication Technology (ICT)

Show amendments

Contents

1. Definition

1.1

For the purposes of child protection, abusive images of children can be divided into:

  • Those which are unlawful; and
  • Material, which although lawful, would give cause for concern and indicate that the person possessing it may pose a risk to children.


Unlawful Material

1.2 An indecent image of a child under the age of 18 years old includes images in photographs, films, negatives, video tape, data stored on digital media that can be converted into a photograph and 'pseudo-photographs' (images made by computers graphics, or other means, which appear to be a photograph). This also covers electronic images created or sent via mobile phones.
1.3 It is for a court to decide what is 'indecent' by application of recognised standards of propriety.
1.4 Possession of indecent material is an offence. Taking, showing or distributing such material amounts to a more serious offence.


Lawful Material

1.5

Lawful material falls outside the above definition, but may involve children in an indecent or sexual context. This could include pictures, cartoons, literature or sound recordings e.g. books, magazines, CDs. MP3, audio files.

Images of children may lawfully be held by professionals as part of the treatment or investigation of a case involving sexual abuse of a child(ren), e.g. doctors or police officers, provided that the material is held for that purpose.

2. Recognition

2.1 Abusive images may be found in the possession of those who use it for personal use, financial gain or distributed to children as part of the grooming process.


Use of the Internet

2.2 For young people, the Internet and associated technologies are an intrinsic part of everyday life, offering access the online world twenty four hours a day, seven days a week. This unlimited, and often unsupervised, access to the World Wide Web allows young people to be entertained, maintain contact with their peers and make contact with others online all at the touch of a button.
2.3 As a consequence, the likelihood of young people encountering inappropriate online content (i.e. pornography or violent images) and suffering cyber bullying, identity theft or blackmail has increased. Although many of these dangers are by no means new, the online world and associated technologies provide an easier route, for those who wish to harm or exploit children, to initiate contact or distribute indecent video clips or photographs of young people.
2.4 Social media, online gaming sites (such as Minecraft) and bulletin boards can be used by offenders as a means of contacting children with a view to grooming them for inappropriate or abusive relationships, including requests to make and transmit pornographic images of themselves or to perform sexual acts live in front of a web cam. The impact of sexual abuse of a child who has been groomed by electronic means is similar to that suffered by other sexually abused children but if images of the abuse have been distributed electronically the impact in terms of harm and vulnerability will be increased.
2.5 Parents may wish to seek advice from their internet service provider of software programme's that are available to limit access to sites that may be unsuitable for children. There is lots of advice available online (see for example UK Safer Internet Centre).

3. Response

3.1

Where there is suspected or actual evidence of anyone accessing or creating indecent images of children, this must be referred to the Police Child Abuse Investigation Unit (CAIU) and Children’s Social Care (CSC) in accordance with the Referral and Assessment Procedure.

Where there are concerns about a child being groomed, exposed to pornographic material or contacted by someone inappropriately, a referral should be made to the CAIU and CSC.

Children, young people and parents are also encouraged to report their concerns directly to CEOP (Child Exploitation and Online Protection Centre) where trained Child Protection Officers will investigate the incident and take appropriate action.

Click here to view the Child Exploitation and On-Line Protection Centre (CEOP) website.

Due to the nature of this type of abuse and the possibility of the destruction of evidence, the referrer should first discuss their concerns with the CAIU and CSC before raising the matter with the family. This will enable a decision to be made about informing the family and ensuring that the child’s welfare is safeguarded.

All such reports should be taken seriously. Most referrals will be followed by a Child and Family Single Assessment and information should be shared between the CAIU and CSC in order to determine whether a strategy meeting should take place.

3.2

A Strategy Discussion will be held whenever it is suspected a parent / carer or someone with access to children in other contexts e.g. employment:

  • Is in possession of child abusive images of children; and / or
  • Has taken, shown or distributed child abusive images of children; and / or
  • Has used the internet or mobile technology to make inappropriate approaches to children.
3.3 The Strategy Discussion must consider all access the individual has to children and initiate a Section 47 Enquiry whenever it is confirmed that a parent or carer of child/ren, or someone with access to child/ren has been involved in one or more of the activities detailed above.

Further information and resources

UK Council for Child Internet Safety, Sexting in schools and colleges: Responding to incidents and safeguarding young people (January 2018)



This page is correct as printed on Sunday 22nd of July 2018 11:53:50 PM please refer back to this website (http://mkscb.procedures.org.uk) for updates.
Close