Will we keep c h i l d r e n s a f e o n l i n e New dat a a rch ite c tu re a n d para digms required
EP3 Foundation EP3 Foundation a 501 c 3 nonprofit is a multi sector community leaders of standards researchers and organisations industry government agencies Results and Imp pact For the first time you can leverage distributed ledger technologies with current data systems to committed to privacy preserving data sharing Our Mission Our mission is to improve health education and wellness by empowering people with PROTECT privacy and co onfidentiality privacy and personalisation VERIF FY identity across many networks What We Do We automate new privacy preserving protocols that improve data privacy and h i d i d security i They Th bind hash and commit usage rules to your data at the smallest attribute level Each attribute is digitally signed by its issuing trust authority and then cryptographically bound together Automating privacy protocols exponentially reduces ft fraud and cybersecurity and eliminates identity theft breaches We enable privacy networks and trust models to Find access and safely share your information and the information you are authorised to use Automate data governance and comply with y policies licensing privacy and cybersecuritty requirements Control your policies for privacy security ty and personalisation Compute on comprehensive pseudonymised obfuscated crypto hashed distributed and partitioned data How we do it We collaborate with stakeholders and trust authorities to set the rules and governance to establish new credentials and accreditation that establish vendor neutral networks These networks support any participants trust criteria protect data and open silos allowing access to the information you agree to share for research clinical trials and to authorise identity LINK data d at the attribu ute level SHARE information only when allowed ENFORCE policies autom matically Health Safety y and Education P i N t ks k and Dashboards Privacy Network We empower provide ers patients students parents and educators with easy access to their privacy protected information We allow data to be analysed and personalised without revealing sensitive information We partner with leading health child safety and education experts to enable data driven decisions to improve h health wellness and education Population and pub blic health professionals can conduct privacy p preserving surveillance on comprehensive data to improve health outcomes and eff fficiencies How to participa ate Start today Participa ate in networks certified for privacy security ty and d regulatory compliance The foundation has demo onstration and pilot initiatives building networks to be b accredited from legacy trust authorities Email info ep3foundation org 177 Park Avenue Suite 20 00 San Jose CA 94113 info EP3Foundation org 2018 EP3 Foundation All Rights Reserved
EP3 Foundation Keeping children safe online why it matters Information and Communications Technologies ICTs enable world citizens to instantly access digital systems that have the potential to create better standards of living improve health save lives educate entertain and inspire For the over four billion of us who have access to the internet 1 very few of us could imagine living productive lives without internet connectivity The world with its circumference of over 40 000 kilometres will shrink to the size of our hand held device and we will be able to go anywhere see anyone and do anything at the touch of a screen and therein lies not just the bright future of our children but also the concern for their safety and wellbeing elements always play a role in the likelihood of children becoming victims Risky online behaviour by children can also elevate the risks Posting identi able information online interacting online with strangers or identifying strangers as friends in social media lists are just some of the risky behaviors kids engage in online children post click search and share information or use smart devices their data is linked to various pro les and grouped into segmented audiences and fed into machine learning algorithms designed to target campaigns that increase sales in uence sentiment encourage online games social networks and religious and political views The problem is aggravated as more and more children are suffering from Problematic Interactive Media Use PIMU In effect when media are overused or used compulsively it can interfere with a child s daily life and lead to poor school performance family con icts emotional and psychological concerns and relationship problems 3 This is a situation that makes children more vulnerable to be isolated from their families manipulated and exploited by perpetrators Perpetrators take advantage of the lack of privacy and security the internet offers to gain a child s trust and develop a relationship with the victim by accessing victims pro les and personal information or by simply following the digital trail that is left continuously by children online Perpetrators do not need to work hard to nd and piece together information about children As Besides the information publicly shared perpetrators also use information obtained through hacking other forms of illegal attacks or human errors bene ting from a network that attracts children but which is unable to keep their information safe and secure To ensure the internet serves as a driver for child safety we must address some of the most pressing challenges for children securing their data balancing technology use protecting privacy fostering healthy relationships and understanding the implications of how their data is used on participating platforms This is critical as the internet continues to bring cybercrime exploitation and radicalisation 2 The list of risks could be considered overwhelming online predators and cyberstalkers pursue and prey on children Impressionable youth are the victims of bullying cyberattacks and fraud Terrorist cells have discovered that the internet can promote their activities and methodologies and act as an effective recruitment tool among the younger generation In addition pornography gaming and other harmful products and problematic behaviors are exacerbated by their almost effortless accessibility Any child or youth can be a victim of the online world But we also know that perpetrators are looking for ways to exploit existing vulnerabilities of children and youth as well as the communities they live in The risk factors that make a child more vulnerable to sexual abuse exploitation traf cking or radicalisation compromise the combination of multiple circumstances Individual social economic and family related www ep3foundation org 3
EP3 Foundation The internet was designed to keep communication lines open The internet is a design philosophy and architecture expressed in protocols This design was meant to ensure resilient communication networks even during natural or manmade disasters It was never designed to be private It began as a government funded project to build decentralised communication networks This design has brilliantly scaled and enabled rapid growth and global expansion However the internet s current design is unable to keep information protected The initial design philosophy of the internet prioritises open communication This has proven year after year that we are unable to keep information safe and secure And children teens and new web users are at the center of this challenge 2017 was the worst year It was not until the late 1980s that the web was commercialised Now commercial and government platforms dominate infrastructures services and applications and consolidate their power controlling choices and online experiences through a data driven model focused on users segmentation and online advertising As more and more people go online their data makes it easier for web companies to target ads directly to them improving the likeliness of purchasing products and services or remaining longer on a web platform The more industries know about our individual hopes fears and desires the better they are able to serve content and ads that people nd interesting or relevant turning highly sensitive personal data into cash ow Our society is producing data at a pace that is unprecedented in human history Just in the last two years 90 of all data was created and there are 2 5 quintillion bytes of data generated each day 4 A rate that continues accelerating given the new users connected devices and technologies In addition others create data about us at the same unprecedented pace Banks schools public agencies smart objects traf c monitoring systems doctors pharmacies and insurance companies among many others are also creating data about us when we commute to work go to school get medical treatment or even when we sleep 4 www ep3foundation org recorded in history for data breaches 5 These attacks undermine not only online trust but also the institutions and political processes that rule our society Breaches chip away at our trust in the accuracy of the data that we use the people who can access it and the devices that send it Today the highest risks to privacy and security are at the ends of the network the places where people access and authorise data use For the rst time since 2007 human mistakes caused more data loss than malicious intrusions into networks compromising seven out of ten reported incidents or 5 4 billion
EP3 Foundation records 6 Humans even those with cyber savvy skills and competencies are at the mercy of the security systems on the technology they use The continued increase in cybercrime is conclusive that digital skills and competencies even when combined with law enforcement efforts to reduce child exploitation are not enough to keep children safe The same commercial tools designed to connect consumers with ads are also used by bad actors including organised crime and leave children connected to their digital experiences with the potential of lifelong emotional and physical harm Data breaches and identity theft are also serious threats to children even very young children Once breached children s sensitive personal information can be released on the dark web with no way to fully retrieve it 7 Millions of children have been victims of identity theft or fraud Two thirds of those victims were age 7 or younger Six in 10 child victims personally knew the perpetrator 8 This problem is especially aggravated because children often rely on a false feeling of online privacy and security sharing identi able information in multiple online platforms without discretion As a result networking sites end up hosting vast amounts of freely shared data that offenders gather easily Online applications also encourage the sharing of information including geotagging of images or geolocation data which facilitates the knowledge of a child s location Our children are found and exploited by criminals The growing number of younger children with access to the internet enables offenders to reach out to children in ways that are simply impossible in of ine environments Behind the screen perpetrators use ICTs to gain access to victims and criminal networks and conceal their location and identity developing new and more ef cient means of nding child victims online They take advantage of the internet to nd and lure potential victims produce child sexual abuse materials upload and disseminate them Social media platforms smart devices forums multiplayer games and other online communications tools give perpetrators a pool of potential victims with whom they can initiate conversations and evaluate reactions In effect exploitation begins when an offender f inds and gains access to a potential child victim Child sex offenders are very manipulative convincing and persistent in their efforts to exploit children9 and may start using information as casual as a favourite sports team fashion trend or music group Then perpetrators focus on their targets based on those children who remain engaged and respond positively to the f irst interactions The child can further be victimised through commercial sexual exploitation and abuse and the commercial live streaming of sex acts www ep3foundation org 5
EP3 Foundation Towards the internet experience we want Human skills alone cannot protect children s access to harmful content or being targeted and groomed for sexual exploitation radicalisation or other form of victimisation Safe and healthy digital environments require new privacy paradigms combined with critical digital skills and competencies A new architecture design is required to shield children from internet harm It is vital to establish a new design that will turn data ows into successes and ensure the internet serves as a driver for innovation scienti c research economic growth and social development How we manage the internet and the deployment of IoT AI blockchain and other distributed ledger technologies will determine whether our society is able to move toward an internet that bene ts all people around the world New EP3 Privacy Networks respond to this challenge by automating and enforcing privacy frameworks These networks enable attribute level data sharing enhanced security and decision intelligence For the rst time comprehensive real time data will be available to determine how to create healthy sustainable communities while also respecting the security and privacy of individuals What we do new data architecture and protocols preserving protocols that improve data privacy and security They bind hash and commit usage rules to your data at the smallest attribute level Each attribute is digitally signed by its issuing trust authority then cryptographically bound together Automating privacy protocols exponentially reduces and eliminates identity theft fraud and cybersecurity breaches n We build privacy preserving networks based on collaborative efforts to protect information but without affecting the ability to analyse link and use the data needed to help our children to thrive The Foundation works to n Develop new trust models expressed in data protocols The EP3 Foundation develops and launches networks and tools to enable new data protocols using current and emerging technologies To do so we automate privacy 6 Convene global trust authorities The EP3 Networks leverage new protection paradigms for data governance built on trust models and trust authorities The trust authorities specify how they de ne enforce and document every aspect of trust for any class of stakeholders n Provide accreditations and certi cations New accreditation and certi cation programmes enable interoperable digital exchange based on privacy security identity veri cation and authentication EP3 programmes www ep3foundation org provide third party accreditation for stakeholders to achieve a trusted environment where privacy and security requirements are maintained n Social norming and scale The EP3 Foundation serves policy leaders looking for solutions to protect their communities We provide leadership outreach education and PR campaigns to help policy leaders normalise the new data governance practices required to improve privacy trust and interoperability How we do it We collaborate with stakeholders and trust authorities to set the rules and governance to develop new credentials and accreditations that establish vendor neutral networks EP3 privacy networks are based on breakthrough innovations that together with the neutral governance of the EP3 Foundation create privacy networks that allow
EP3 Foundation and protocols We don t have to continue to turn a blind eye to the unintended consequences of connecting millions of children to global communication networks designed to be open during natural or manmade disasters but which do not protect their privacy childhood or wellbeing The vast potential the internet holds for billions of people across the world can only be realised when privacy networks and tools safeguard the world s children Access to privacy preserving data provides the intelligence necessary to make evidence based decisions but not at the expense of individual privacy It also enables collaborative innovation in any industry that requires coordination and relies upon privacy sensitive proprietary or regulated data For the f irst time comprehensive real time data is available to determine how to create healthy sustainable communities whilst also respecting the rights and privacy of individuals People of all ages can understand workforce trends prepare individuals to succeed in their career college and citizenship and connect individuals to resources and opportunities organisations and individuals to pool anonymise share and analyse sensitive data while complying with privacy and security regulations The EP3 Networks cryptographically bind different trust criteria and trust credentials to different resources creating attribute level Trust Blocks used to automate enforcement verify identities and share information only when allowed Act now children are already immersed Children and youth are already immersed in a new digital environment and culture where they can go anywhere see anyone and do anything at the touch of a screen To thrive they must understand this new environment and learn the skills and habits needed to be both protected and productive When f irst connected children need protection Later they need a network of support from stakeholders to guide and foster creativity and exploration To keep children safe online organisations and governments alike must secure information ensure con dentiality and protect privacy while also giving individuals the capacity to access and aggregate the information they are authorised to use It is time for the organisations governments and national authorities to take greater responsibility on how they protect children s data and how they can proactively stop harmful practices that affect our children s privacy and security Get started today We invite you to be part of the solution Participate with EP3 Foundation to develop the rules and governance needed to protect information and enforce policies Participate in pilot initiatives and build the certi cation needed in your country and community Co n t a c t u s info ep3foundation org The only way to keep children safe is to implement new privacy protecting designs and protocols As we connect new generations of children and communities online our unique opportunity is to be the generation that implements new additional privacy protecting designs www ep3foundation org 7
References 1 Nathan Mcdonald Digital in 2018 World s internet users pass the 4 billion mark 2018 Available at https wearesocial com us blog 2018 01 globaldigital report 2018 Accessed 6 Nov 2018 2 UNODC Cybercrime protecting children from online abuse and exploitation 2015 Available at https www unodc org unodc en frontpage 2015 Ju ly cybercrime protecting children from onlineabuse and exploitation html Accessed 6 Nov 2018 3 Center on Media and Child Health Problematic Interactive Media Use PIMU 2018 Available at http cmch tv parents pimu Accessed 5 Nov 2018 4 Bernard Marr How Much Data Do We Create Every Day The Mind Blowing Stats Everyone Should Read Available at https www forbes com sites bernardmarr 2018 05 21 how much data do we create every daythe mind blowing stats everyone should read 76b 8866060ba 5 Daniel Solove Data Security Is Worsening 2017 Was the Worst Year Yet 2018 https teachprivacy com data security isworsening 2017 was the worst year yet Accessed 6 Nov 2018 6 Riskbase Security Data Breach QuickView Report 2017 2017 7 Tina Nazerian FBI Warns Educators and Parents About Edtech s Cybersecurity Risks 2018 Available at https www edsurge com news 2018 09 14 fbi warns educators and parents about edtech s cybe rsecurity risks Accessed 7 Nov 2018 8 News Insights Identity Guard Available at https www identityguard com news insights Accessed 5 Nov 2018 9 ECPAT International Trends in online child sexual abuse material 2018 Available at http www ecpat org wpcontent uploads 2018 07 ECPAT International Repo rt Trends in Online Child Sexual Abuse Material2018 pdf Accessed 5 Nov 2018 Authors Marsali Hancock Co founder President CEO Elinela P rez LL M VP Sandra Elliott Ph D Chief Education Of cer EP3 Foundation 177 Park Avenue Suite 200 San Jose CA 94113 USA 1 408 800 7202 info ep3foundation org www ep3foundation org Linked In www linkedin com company ep3foundation Twitter twitter com marsalih lang en YouTube www youtube com watch v EVIafG5bkcs