
Child Online Protection: CSA Regulation Update and Age Assurance Discussion
Stay informed about the latest legislative proceedings regarding the CSA Regulation proposed by the European Commission. Discover crucial points discussed, such as age assurance and combating online child sexual abuse. Contribute to the development of reliable and user-friendly age assurance methods for enhanced protection of minors online.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Document CWG-COP-20/INF/17 12 January 2024 English Only Report by Stiftung Digitale Chancen (Digital Opportunities Foundation) CSA-R: overcome crucial points Purpose This presentation informs about the current status of legislative proceedings of the European Commission s proposal for a CSA-Regulation and motivates for specific contribution(s). Action required This presentation is delivered to the Council Working Group on Child Online Protection in order to to discuss the conclusions of the presentation. References CSA-R proposal https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52022PC0209 LIBE Minutes https://www.europarl.europa.eu/doceo/document/LIBE-PV-2023-11-13-1_EN.pdf www.itu.int 1
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Status of legislative proceedings European Commission s proposal: 11 May 2022 European Parliament s position by LIBE decision: 14 October 2023 European Council negotiation: continuing www.itu.int 2
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Combating online child sexual abuse proposed extension of the temporary derogation from certain provisions of Directive 2002/58/EC Aims to extend the temporary derogation until 3 August 2026 Open consultation until 12 February 2023 www.itu.int 3
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Crucial points to be discussed Age assurance Detection in end-to-end encrypted digital environments www.itu.int 4
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Specific contribution (1): Age Assurance Age assurance would help to address grooming and prevent contact of adult perpetrator to minors avoid access of minors to age-inappropriate content reduce the need for detection Request for research and development of age assurance methods that are reliable technology neutral future-proof privacy preserving preserving the anonymity of users user friendly and easy to apply for users of all ages www.itu.int 5
Council Working Group on Child Online Protection Twentieth meeting - From 22 to 23 January 2024 Specific contribution (2): Detection in end-to-end encryption Definition when and how detecting in e-2-e encrypted environment must be an option in order to protect children online in the event of reasonable suspicion or evidence towards a certain user or account by order of a court or an authorised body Request for research and development regards a locked backdoor to encryption, to be opened only for a single purpose with a special key and a permanent log-in protocol procedure in place provided that the key can be protected against unauthorized use, e.g. by several actors who jointly store the key, and allow, and control it s use. www.itu.int 6