1
Guidance Note
For educational authorities, NGO partners and institutions who wish to provide children with safe digital devices for distance learning
May 2020
UNICEF Albania
CHILDREN AND DIGITAL DEVICES Protecting children’s online safety on digital devices
2
Introduction
The COVID-19 emergency has changed how children and adolescents around the globe are being
educated, with distance schooling and studying online becoming the new normality for school
children almost everywhere. (...) Longer hours online connected through digital devices both for entertainment and
for education purposes, means increased exposure to online risks for children.
(...) In this context, this note aims to provide guidance to relevant actors on the recommended
measures and steps that they will need to implement to ensure that devices distributed to children
with the aim of ensuring internet connectivity will minimize children’s exposure to online risks and
security related threats, while allowing them to maximize the benefits of their online experience.
Language:English
Score: 1126566.4
-
https://www.unicef.org/albania...%20the%20digital%20devices.pdf
Data Source: un
Goal 1: Educate
The Role of Teachers
• Primary source for child online safety instruction
• Share responsibility with parents
• Assuage parents’ concerns about gaps in their instruction
• Tailor lessons by learning about how students use the internet
Device Safety
• Proper password practice: long, random, never shared
• Perhaps teach to use password managers?
• Security still necessary even with safe school-provided devices,
because students will use others
• E.g. personal phones, PC cafes, friends’ devices
Digital Citizenship
• Media literacy
• Social competence
• Online safety curriculum
• Antibullying programs, including treatment of bullying over digital
mediums
Goal 2: Build a Safe Digital
Environment
Online Safety Coordinator
• Don’t try to do this ad hoc!
• Appoint and train someone to perform the role
• Online safety incidents should be reported to coordinator
• Coordinator should ensure administration is well-informed about
state of online safety
Technical Defenses
• Provisioning good computing devices
• Using accredited ISP, reputable filtering/monitoring tools, network
software, applications
• Keep software up-to-date
• Use firewalls and antivirus
• Check for unknown devices
• Robust password policy for educators and students
Acceptable Use Policy
• Policy governs what school devices may be used for
• Should be in plain language so it is understood
• For younger students, perhaps have as a video
Safe Digital Environment Policy
• Ensure teachers are educated about safe behavior
• Regulate in what circumstances the school may take photos of
students and for what purposes those images may be use
• Seek student or parent permission before using images
• Develop metrics for policies, regularly audit
Goal 3: Serve as a Role Model
On the Job
• Follow acceptable use policy
• Abide by same rules on use of personal electronic devices
• Communicate professionally with students and parents
• Use school email for professional communication
• Remote learning policy taking into account environment and other
people
Off the Job
• Educators’ online presence reflects on their institution
• Can model proper care for one’s digital reputation
• Consider policy curtailing one-on-one digital communication by
educators, especially for non-educational purposes
Language:English
Score: 1101292
-
https://www.itu.int/en/ITU-D/R...idelines%20for%20Educators.pdf
Data Source: un
Guidance Note: Protecting children’s online safety on digital devices | UNICEF Albania
Skip to main content
Albania
Toggle navigation
English
Shqip
Global Links
Visit UNICEF Global
High contrast
Albania
Explore UNICEF
About UNICEF Albania
Contact us
Work with us
U-Report
Press centre
Donate
Main navigation
What we do
Research and reports
Stories
Take Action
Search area has closed.
(...) Search Close
Search UNICEF
Fulltext search
Max
Document
Guidance Note: Protecting children’s online safety on digital devices
UNICEF/ALBANIA/LAZE/2019
About
This technical note “Protecting children’s online safety on digital devices in Albania” aims to provide guidance to relevant actors on the recommended measures and steps that they will need to implement to ensure that devices distributed to children with the aim of ensuring internet connectivity will minimize children’s exposure to online risks and security related threats, while allowing them to maximize the benefits of their online experience. The guidance note was developed by UNICEF child protection team in collaboration with ICT Department and it will prove beneficial to educational authorities, development or philanthropic partners, NGOs as well as ICT industry actors that are engaged in distribution of digital devices for children.
Download document
Download file
(PDF, 229,05 KB)
Related topics
Child protection
Child rights
Child abuse
Albania
More to explore
Press release
09 December 2016
UNICEF launches Online Child Safety Campaign
Visit the page
Article
"Tech Camp" in Shkodra, Korça and Tirana
Tech Camp, three days inside the world of technology to learn more about programming and internet security
Read the story
Press release
05 September 2022
Rita Ora visits "The house of Colors" in Tirana
Visit the page
Press release
08 July 2022
Presentation of the Study "Trafficked by Someone I Know"
Visit the page
Footer
UNICEF Home
What we do
Press Center
Stories
Take Action
About UNICEF Albania
Work with us
Convention on the Rights of the Child (CRC)
Frequently asked questions
Research and reports
Publications
We all matter
Become a donor
Social
Footer Secondary
Contact us
Legal
Footer tertiary
Report fraud, abuse, wrongdoing
Language:English
Score: 1086701.9
-
https://www.unicef.org/albania...-online-safety-digital-devices
Data Source: un
PowerPoint Presentation
ITU-T SG 11 Workshop Global Approaches on Combating Counterfeiting and Stolen ICT Devices
Presenter: Engr. Kunle Olorundare, SMIEEE Date: 23rd July, 2018
At ITU-T SG 11 Meeting, July 2018
NIGERIA APPROACH ON COMBATTING COUNTERFEIT
AND STOLEN ICT DEVICES
Engr. (...) The End
References
ITU Conformity and Interoperability technical paper, 2014
Counterfeit/substandard phone, A resource guide for government (Mobile Manufacturers Forum) [online]
The Economic Impact of Counterfeiting, Source: https://www.oecd.org/sti/ind/2090589.pdf [online].
Bibliography
Iso.org [online]
www.ncc.gov.ng(Type Approval Regulation)
Intersil Environmental Management Policy Document.
OECD document[online].
Pecb.org [online]
R&TTE Directive Annex 5 [online]
…Bibliography
ITU Technical Report, Technical Standardization Sector,
2014 [online].
WTO Committee on Technical Barriers to Trade,
Suppliers Declaration of Conformity, 2003 [online].
Language:English
Score: 1086249.2
-
https://www.itu.int/en/ITU-T/W...23/Documents/2_James_Kunle.pdf
Data Source: un
People
experiencing exclusion from the digital space might identify with several social identities, which
creates different barriers for connecting online and using digital devices, services, and platforms
equitably. (...) Without the capacity to use digital devices as well as to
find, use, and adapt information retrieved from the online world and through digital platforms, in
addition to creating content and sharing it online, connectivity alone does very little.
(...) Having a device to connect is not solely enough to access online.
Language:English
Score: 1084081.1
-
https://www.un.org/techenvoy/s...finition_Digital-Inclusion.pdf
Data Source: un
PowerPoint Presentation
Safe & Secure Mobile Experience: The Key Issues
Shola Sanni – GSMA Policy Manager, Africa ITU Regional Forum on Consumer Information, Protection & Rights for Africa
Cotonou BENIN, 14-16 March 2017
CONFIDENTIAL
Mobile sector priorities on Safety & Security
Protecting mobile consumers
Safeguarding children & vulnerable persons
Addressing handset theft & counterfeit devices
Collaboration to combat
Industry model to combat handset theft
Fraud via mobile device
Addressing and minimising fraud
Bonus slide – Mobile Connect
Outline
3
Mobile sector priorities for Safety & Security
PROTECTING
CONSUMERS
from illegal activity
& ASB
PROTECTING
CONSUMER PRIVACY &
securing customer data
PROTECTING
PUBLIC SAFETY
& meeting legal
obligations
PROTECTING
NETWORKS & DEVICES
to keep communications
secure
4
Mobile sector priorities for Safety & Security
PROTECTING
CONSUMERS
from illegal activity
& ASB
PROTECTING
CONSUMER PRIVACY &
securing customer data
PROTECTING
PUBLIC SAFETY
& meeting legal
obligations
PROTECTING
NETWORKS & DEVICES
to keep communications
secure
5
Protecting mobile consumers
Key issues in mobile consumer protection
Safeguarding children & vulnerable persons
online
Reducing device theft, trade of stolen
devices, sale & use of counterfeit devices
Mitigating fraud and mobile device security
threats
6
Safeguarding children & vulnerable persons
Operators • Prevent access, distribution & promote reporting of online child abuse
content – GSMA Mobile Alliance Against Child Sexual Abuse Content
• Encouraging children‟s safe & responsible internet use – GSMA mYouth
program promoting positive use of ICTs
• Supporting inclusion & safety of women through GSMA Connected Women
program focusing on security & harassment issues
Government
Ecosystem
• Establish clear & transparent legislation regarding illegal content & empower
law enforcement before instituting enforcement processes
• Actively collaborate with ecosystem to establish best practices for ensuring
online safety & bridging the digital gender gap
• Review policy & regulatory frameworks to promote digital inclusion & avoid
undue “blocking” of internet access
• Ensure national reporting hotlines are in place to action online abuse reports
• Embrace programmes designed to help build “Digital Resilience”
• Educate on potential online issues & encourage positive online behaviours
• Implement technical solutions e.g. parental controls & reporting mechanisms
• Collaborate across ICT ecosystem to address the issues
7
Addressing handset theft & counterfeit devices
GSMA allocation of IMEIs
to 3GPP compliant devices
Blacklist – initiative to block stolen mobile
devices, based on a shared database of IMEIs
of stolen mobile devices reported by consumers
GSMA IMEI security initiative - technical
design principles for IMEI security
implementation & GSMA‟s IMEI Security
Weakness Reporting and Correction Process
GSMA Anti-Theft Device Feature
Requirements document for implementation
of “Kill Switch” capability in devices
8
Collaboration to combat
9
Industry model to combat handset theft
Latin America Case Study
10
Fraud via mobile device
Social engineering fraud : examples
Phishing – method used to infect computers or mobile devices to access
valuable personal details – fraudsters use communications like email to tempt
people to access what appear to be authentic websites or services
SMiShing – or „SMS phishing‟ uses phone text messages to deliver the “bait”
which then induces people to divulge their personal information
Vishing – when fraudsters persuade victims to hand over personal details or
transfer money, over the phone by impersonating a genuine service, e.g. a
bank
11
Addressing and minimizing fraud
Role of Operators
• Technology solutions – operators
adopt GSMA recommended techniques
for detecting & dealing with international
fraudulent mobile spam
• Consumer authentication – Mobile
Connect, GSMA guidelines for secure
voicemail access
• Education & awareness - how to
protect personal details and identify
potential threats
• Develop robust risk management
strategies
Role of Government
• Cross-sector enforcement of
technology solutions – ensure banks
& retailers implement highest possible
level of security measures related to
their service
• Institute legislation and regulation
focused on perpetrators
• Preventative controls - consumer
awareness campaigns, increase
consumer education & protection to help
minimise their exposure to fraud
12
Read more on safety, privacy &
security across the mobile ecosystem
Report available at
http://www.gsma.com/publicpolicy/wp-
content/uploads/2017/02/GSMA_Safet
y-privacy-and-security-across-the-
mobile-ecosystem.pdf
Published February 2017
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
http://www.gsma.com/publicpolicy/wp-content/uploads/2017/02/GSMA_Safety-privacy-and-security-across-the-mobile-ecosystem.pdf
Thank you
Copyright © 2017 GSMA. (...) Convenient: easily register and log in to websites and apps,
authorising transactions when online, confirming the users‟ true
identity in a secure digital transaction.
Language:English
Score: 1081935.4
-
https://www.itu.int/en/ITU-D/R...nni_GSMA_SAFETY%20SECURITY.pdf
Data Source: un
Attended by 85 participants representing national statistical offices, ministries, regulators and international and regional organizations, as well as the private sector.
EGH Online Forum and Face-to-face Meeting Discussion and Outcomes
Internet by type of portable device and
network used
Internet security
Child and youth online protection
Mobile phone ownership
Mobile phone activities
Barriers to Internet use by individuals
ICT employment
Future work of the EGH
11/25/2014
4
INTRODUÇÃOInternet by type of portable device and network used
The EGH agreed on the definition and response categories of the indicator individuals using the Internet by type of portable device and network used to access the Internet .
(...) Internet by type of portable device and network used
Did you use any of the following portable device to access the Internet in the last three months?
(...) INTRODUÇÃOMeasuring child and youth online protection
The EGH recognized that child online protection is relevant for policy making but difficult to measure.
Language:English
Score: 1081523
-
https://www.itu.int/en/ITU-D/S.../events/wtis2014/014_E_doc.pdf
Data Source: un
Use devices in open areas of the home — this can help you manage and be aware of who your child interacts with online through phones, tablets, smart TVs, gaming consoles and other connected devices.
6. (...) Here are some helpful tips: • During non-school hours at home, establish time limits around when and for how
long your child can be online. • Use the available technologies — parental controls and tools to monitor online time
allow you to measure and set time limits on device use or internet access. (...) • Prepare — locate the computer, device or games console in an open area of your
home and use available parental controls and safety features for devices, browsers and apps.
• Stay involved — talk regularly with your child about their gaming interests and who they play with online.
Language:English
Score: 1076661.1
-
https://www.itu.int/en/ITU-D/C...0the%20COVID-19%20pandemic.pdf
Data Source: un
During registration with an online service, the user’s client device creates a new key pair. It retains the private key and registers the public key with the online service. Authentication is done by the client device proving possession of the private key to the service by signing a challenge. (...) All rights reserved.
• User is prompted to choose an available FIDO authenticator that matches the online service’s acceptance policy.
• User unlocks the FIDO authenticator using a fingerprint reader, a button on a second– factor device, securely–entered PIN or other method.
• User’s device creates a new public/private key pair unique for the local device, online service and user’s account.
• Public key is sent to the online service and associated with the user’s account.
Language:English
Score: 1073818.1
-
https://www.itu.int/en/ITU-T/e...20iOS%20Toolkit%20Overview.pdf
Data Source: un
E-guide: How to Protect the Data in Mobile Devices
The E-Guide “How To Protect Data In Mobile Devices” highlights the importance of protecting data in mobile devices. Many times, people do not realize how much data is in their mobile device. Ordinary practices such as sending email, accessing social media, and banking online can encourage criminals to steal someone’s identity in order to access information related to credit card numbers, addresses, and contact details, among others. The Guide will recommend several actions that should be taken into consideration to ensure data protection in mobile devices.
How To Manage Your Online Privacy
Who has never seen an online ad popping, just a few minutes after searching for the exact same item?
Language:English
Score: 1073447.9
-
https://www.itu.int/en/cop/Pages/trend-micro.aspx
Data Source: un