-
Notifications
You must be signed in to change notification settings - Fork 0
/
your-answer-scrollbar.html
1275 lines (1231 loc) · 74.6 KB
/
your-answer-scrollbar.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!doctype html>
<html lang="en">
<head>
<!-- Required meta tags -->
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="description"
content="Under the Online Safety Act, Ofcom's job is to make online services safer for the people who use them. We make sure companies have effective systems in place to protect users from harm." />
<title>Online Safety</title>
<link rel="icon" href="assets/img/Favicon2024.svg" />
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.2.0/css/all.min.css"
integrity="sha512-xh6O/CkQoPOWDdYTDqeRdPCVd1SpvCA9XXcUnZS2FmJNp1coAFzvtCN9BmamE+4aHK8yyUHUSCcJHgXloTyT2A=="
crossorigin="anonymous" referrerpolicy="no-referrer" />
<!-- Bootstrap CSS -->
<link href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" rel="stylesheet"
integrity="sha384-QWTKZyjpPEjISv5WaRU9OFeRpok6YctnYmDr5pNlyT2bRjXh0JMhjY6hW+ALEwIH" crossorigin="anonymous">
<!--
<link href="css/main-2.css" rel="stylesheet">
<script src="js/jquery-3.7.1.min.js"></script>
<script type="text/javascript" src="js/main.js"></script> -->
<link href="css/main.css" rel="stylesheet">
<script src="js/jquery-3.7.1.min.js"></script>
<script type="text/javascript" src="js/main.js"></script>
</head>
<body>
<header class="header fixed-top d-flex align-items-center position-absolute">
<a class="skip-to-content-link" href="#skipToContent" tabindex="0">Skip to main content</a>
<div class="container-xxl d-flex align-items-center">
<div class="logo me-auto me-lg-0">
<a href="/" title="Ofcom"><img class="brand-logo" src="assets/img/logo2023_2.svg" alt="OfCom Logo"></a>
</div>
<div class="header-title">STEP 1 - UNDERSTAND THE HARMS</div>
<div class="header-title">USER TO USER SERVICE</div>
</div>
</header>
<section id="help-section" class="help position-absolute">
<div class="gray-bg">
<div class="container-xxl">
<div class="row">
<div class="col-12">
<div class="py-3">
<div class="rich-text-block">
<div>Help us to improve this service <a href="/os-feedback-page/" title="Provide feedback">Provide
feedback.</a></div>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
<main role="main" class="height-100">
<section class="height-100">
<div class="os-back-button">
<div class="container-xxl">
<div class="row back">
<div class="col-12">
<div id="back-button" class="py-3 back-button">
<a href="?question=185294&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&type=UserToUser">< Back</a>
</div>
</div>
</div>
</div>
</div>
<div class="main height-100">
<form method="post" id="questionForm" style="width:100%">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__FormGuid" value="14f58b6f-4aaa-4f4f-8b17-5e2ff5c95b24" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__FormHostedPage" value="185279" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__FormLanguage" value="en" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__FormSubmissionId" value="27418bef-cc0c-4668-a5ae-d71eb64b5813" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized" name="submit"
value="NextStep" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__FormCurrentStepIndex" value="0" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized" name="__stfId"
value="" data-f-type="hidden">
<input type="hidden" class="Form__Element Form__SystemElement FormHidden FormHideInSummarized"
name="__selectedServiceType" value="UserToUser" data-f-type="hidden">
<div class="container-xxl">
<div class="row">
<div class=" col-md-6 order-last-div checker-container left scroll-visible checker-container-p-0">
<div class="blue-bg">
<div class="left-container pt-5 your-answer-pdng-left">
<span class="summary-pdf-print-class">Play Back Summary</span>
<h1 id="skipToContent">Your answers</h1>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Is your service any of the following service types?</div>
<a class="btn btn-edit"
href="?question=185304&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Social media service
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service allow child users to access some or all of the
service?</div>
<a class="btn btn-edit"
href="?question=185303&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Yes
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service have any of the following functionalities related
to how users identify themselves to one another?..</div>
<a class="btn btn-edit"
href="?question=185299&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• None of the above
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service have any of the following functionalities related
to how users network with one another?</div>
<a class="btn btn-edit"
href="?question=185308&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Users can connect with other users
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service have any of the following functionalities that
allow users to communicate with one another?</div>
<a class="btn btn-edit"
href="?question=185309&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Posting or sending images or videos through open or closed channels
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service allow users to post goods and services for sale?
</div>
<a class="btn btn-edit"
href="?question=185310&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Yes
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service have any of the following functionalities that
allow users to find or encounter content?</div>
<a class="btn btn-edit"
href="?question=185311&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Searching for user-generated content
</p>
</div>
<div>
<div class="qn-type">
<div class="qn-text fw-bold">Does your service use content or network recommender systems?</div>
<a class="btn btn-edit"
href="?question=185312&id=27418bef-cc0c-4668-a5ae-d71eb64b5813&returnUrl=1&type=UserToUser">edit</a>
</div>
<p class="ans-text">
• Yes
</p>
</div>
<div class="row">
<div class="col-12">
<button class="btn btn-secondary my-2 download" onclick="window.print();return false;">Download
Summary</button>
<div>
<a href="/task-list-page/?id=27418bef-cc0c-4668-a5ae-d71eb64b5813&type=UserToUser"
class="btn btn-secondary my-2 btn-green step">
Continue to Step 2<i class="fa-solid fa-arrow-right ms-2"></i>
</a>
</div>
<a href="/task-list-page/?id=27418bef-cc0c-4668-a5ae-d71eb64b5813&type=UserToUser"
class="mt-4 d-block save save-link">
Save and come back later
</a>
</div>
</div>
</div>
</div>
</div>
<div class="col-md-6 order-first-div checker-container right scroll-visible checker-container-p-0">
<div class="right-container">
<section class="onlyPrint">
<div class="mb-5">
<strong> Your unique reference number </strong>
<div class="d-flex justify-content-center align-items-center border-gray p-3 mt-2">
<span class="fs-32"> OSARUL2L4NR </span>
</div>
</div>
</section>
<h2 class="visually-hidden">Your potential risk factors and illegal harms as User to User service</h2>
<h3 class="mb-3">Your potential risk factors and illegal harms as User to User service</h3>
<span class="fs-sm">Is your service any of the following service types?</span>
<div class="fs-sm fw-bold mb-3">Social media service</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">Social Media Services</h4>
<p>
Many social media services are designed to maximise engagement between users. If your service
is a social media service, you should consider how potential perpetrators may exploit this
design for illegal purposes. For example, potential perpetrators may exploit the likelihood of
virality to share illegal content with very large groups of people. Social media services can
also be used by potential perpetrators of grooming to target young users by sending out many
messages. These services are also used in large-scale foreign interference campaigns to spread
disinformation. Research shows that social media services can increase the risk of nearly all
kinds of illegal harm, except for firearms and other weapons offences where we do not
currently have evidence. This may be due to more research on social media services, or greater
probability of risk due to the wide range of functionalities and features on many social media
services.
</p>
<p class="fs-sm"> Key kinds of illegal harm </p>
<ul class="list-info">
<li>
Terrorism offences
</li>
<li>
Child sexual exploitation and abuse
</li>
<li>
Grooming
</li>
<li>
Image-based child sexual abuse material
</li>
<li>
URL-based child sexual abuse material
</li>
<li>
Encouraging or assisting suicide (or attempted suicide) offences
</li>
<li>
Harassment, stalking and abuse offences
</li>
<li>
Hate offences
</li>
<li>
Controlling or coercive behaviour offences
</li>
<li>
Drugs and psychoactive substances offences
</li>
<li>
Firearms and other weapons offences
</li>
<li>
Unlawful immigration offences
</li>
<li>
Human trafficking offences
</li>
<li>
Sexual exploitation of adults offences
</li>
<li>
Extreme pornography offences
</li>
<li>
Intimate image abuse offences
</li>
<li>
Proceeds of crime offences
</li>
<li>
Fraud and financial services offences
</li>
<li>
Foreign interference offence
</li>
<li>
Animal cruelty offences
</li>
</ul>
<div class="row">
<div class="col-12">
<div class="accordion mt-3">
<div class="accordion-item accordian-panel">
<div class="accordion-header" id="heading1">
<h2 class="accordion-header">
<button class="accordion-button accordion-head collapsed" type="button"
data-bs-toggle="collapse" data-bs-target="#collapseId4321" aria-expanded="false"
aria-controls="collapse1">
How the harms relate to the risk factor </button>
</h2>
</div>
<div id="collapseId4321" class="accordion-collapse collapse"
data-bs-parent="#myAccordion">
<div class="card-body">
<strong>
Terrorism offences
</strong>
<p>
A wide range of types of user-to-user services are known to be used by terrorist
actors. Social media services are particularly relevant to perpetration of this
harm because of their reach and popularity.
</p>
<strong>
Child sexual exploitation and abuse
</strong>
<p>
DESCRIPTION MISSING
</p>
<strong>
Grooming
</strong>
<p>
Perpetrators can groom children in a multitude of different ways, and there are
many different services where grooming is conducted. Social media services, gaming
services and messaging services are commonly used in propagating this offence.
</p>
<strong>
Image-based child sexual abuse material
</strong>
<p>
There is evidence that social media services are known high-risk spaces for CSAM
sharing. This may be in part because some social media services have a large user
base. Social media services can be used as directories that allow perpetrators to
signpost users to other services where CSAM is shared.
</p>
<strong>
URL-based child sexual abuse material
</strong>
<p>
Certain functionalities on social media services have been found to be risk
factors. There is evidence of hyperlinks and plain-text URLs to CSAM being posted
on social media services in a ‘scattergun’ approach that can drive up web traffic,
and income for those hosting CSAM content.
</p>
<strong>
Encouraging or assisting suicide (or attempted suicide) offences
</strong>
<p>
Social media services can allow potential perpetrators to disseminate suicide or
self-harm content. Users can view suicide or self-harm content on these types of
services, particularly through the creation of user groups on social media
services.
</p>
<strong>
Harassment, stalking and abuse offences
</strong>
<p>
Research indicates that social media services are used to commit and facilitate
various forms of abuse and harassment, including threats to kill and misleading
information that can result in violence.
</p>
<strong>
Hate offences
</strong>
<p>
Social media services and online gaming services pose a particular risk of hate
offences. Users can first build a community of like-minded individuals to share
provocative content on a large social media service, without breaching the
service’s terms and conditions for hateful conduct. They may then direct their
user networks to smaller and less-moderated services.
</p>
<strong>
Controlling or coercive behaviour offences
</strong>
<p>
Social media services offer perpetrators multiple ways to monitor victims and
survivors, and to pursue campaigns of targeted abuse. Controlling or coercive
behaviour often happens across several social media services simultaneously.
</p>
<strong>
Drugs and psychoactive substances offences
</strong>
<p>
Based on the evidence available, social media services and messaging services
appear to be the service types that are most at risk of being exploited by
perpetrators buying or offering to supply drugs and other psychoactive substances.
</p>
<strong>
Firearms and other weapons offences
</strong>
<p>
DESCRIPTION MISSING
</p>
<strong>
Unlawful immigration offences
</strong>
<p>
Social media services and messaging services are shown to be risk factors for
unlawful immigration. Among other elements, they are used to target potential
victims and advertise services. Often, perpetrators will identify their victim on
social media before transitioning to an encrypted private messaging service to
further the facilitation of the offence.
</p>
<strong>
Human trafficking offences
</strong>
<p>
Social media services and messaging services are shown to be risk factors for
human trafficking. Among other elements, they are used to target potential victims
and advertise services. Often, perpetrators will identify their victim on social
media before transitioning to an encrypted private messaging service to further
the facilitation of the offence.
</p>
<strong>
Sexual exploitation of adults offences
</strong>
<p>
Social media services are likely to be used by potential perpetrators to recruit
victims and to advertise the services of the victims and survivors they have
gained control of for sexual exploitation.
</p>
<strong>
Extreme pornography offences
</strong>
<p>
DESCRIPTION MISSING
</p>
<strong>
Intimate image abuse offences
</strong>
<p>
Research indicates that a number of types of services, including social media
services, are used to facilitate or commit offences related to intimate image
abuse. In some cases, intimate images are shared on social media services, and
then re-shared to other sites.
</p>
<strong>
Proceeds of crime offences
</strong>
<p>
Our evidence shows that proceeds of crime offences committed or facilitated online
rely on social media services and messaging services that have a broad user base
and wide reach.
</p>
<strong>
Fraud and financial services offences
</strong>
<p>
Research indicates that fraud takes place on a number of types of services,
including social media services. Different types of fraud may appear on different
types of service; for example, investment fraud or ghost broking activities are
more likely to occur on social media services.
</p>
<strong>
Foreign interference offence
</strong>
<p>
There is a particular risk of foreign interference offences happening on social
media services, where perpetrators of the offence can create fake profiles which
can be manipulated by bots.
</p>
<strong>
Animal cruelty offences
</strong>
<p>
DESCRIPTION MISSING
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <span class="fs-sm">Does your service allow child users to access some or all of the
service?</span>
<div class="fs-sm fw-bold mb-3">Yes</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">Child users (under 18s)</h4>
<p>
If your service has a high proportion of child users or is aimed at children, your service may
be used by potential perpetrators to identify and initiate contact with children for the
purposes of grooming them. Child users may also upload, post or share self-generated indecent
images (indecent images that are shared often consensually between children and can be
non-consensually reshared). These risks can increase for both child sexual abuse material and
grooming if your service has direct messaging and/or encrypted messaging. If so, you should
refer to the Risk Profiles for direct messaging and encrypted messaging as children may also
experience different or increased risks across other kinds of illegal harm. Gender and other
protected characteristics of users on your service affects how likely they are to experience
illegals harms from illegal content. Please refer to the user base demographics risk factor at
the end of this tool.
</p>
<p class="fs-sm"> Key kinds of illegal harm </p>
<ul class="list-info">
<li>
Child sexual exploitation and abuse
</li>
<li>
Grooming
</li>
<li>
Image-based child sexual abuse material
</li>
<li>
URL-based child sexual abuse material
</li>
</ul>
<div class="row">
<div class="col-12">
<div class="accordion mt-3">
<div class="accordion-item accordian-panel">
<div class="accordion-header" id="heading1">
<h2 class="accordion-header">
<button class="accordion-button accordion-head collapsed" type="button"
data-bs-toggle="collapse" data-bs-target="#collapseId8868" aria-expanded="false"
aria-controls="collapse1">
How the harms relate to the risk factor </button>
</h2>
</div>
<div id="collapseId8868" class="accordion-collapse collapse"
data-bs-parent="#myAccordion">
<div class="card-body">
<strong>
Child sexual exploitation and abuse
</strong>
<p>
DESCR
</p>
<strong>
Grooming
</strong>
<p>
For grooming offences, a high-risk factor in terms of user base characteristics is
the age of users. Groomers who want to contact child users will be drawn to
services that children access. You should consult the ‘Grooming’ chapter in our
Register of Risks to understand more about how harms manifest online in respect of
user base.
</p>
<strong>
Image-based child sexual abuse material
</strong>
<p>
Child users on a service can be a risk factor for CSAM, as offenders may search
for content uploaded by children on their personal accounts; in some cases, such
content may be considered CSAM. You should consult the CSAM chapter in our
Register of Risks to understand more about how harms manifest online in respect of
user base.
</p>
<strong>
URL-based child sexual abuse material
</strong>
<p>
DESCR
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <span class="fs-sm">Does your service have any of the following functionalities related to how
users identify themselves to one another?</span>
<div class="fs-sm fw-bold mb-3">None of the above</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">No risk factors</h4>
<p>
No risk factors identified.
</p>
</div>
</div>
</div> <span class="fs-sm">Does your service have any of the following functionalities related to how
users network with one another?</span>
<div class="fs-sm fw-bold mb-3">Users can connect with other users</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">User connections</h4>
<p>
User connections may be used by potential perpetrators to build networks and establish contact
with users to target, you should also review the risk profile on user profiles . For terrorism
and drug offences, user connections can be used by potential perpetrators to connect with
thousands of other users to widely share illegal content. Our evidence also suggests that
terrorists may exploit these networks to raise funds, in particular if online payments can be
made on the service.
Potential perpetrators can also use connections to build online networks which can enable them
to access other users indirectly. For example, this could be to gain visibility of a target’s
user profile in cyberstalking offences or to serve to add legitimacy to fraudsters and their
content. These connections can also be used by online groomers to appear as if they are part
of a child’s social network allowing them to establish contact with child users and begin
communicating.
</p>
<p class="fs-sm"> Key kinds of illegal harm </p>
<ul class="list-info">
<li>
Terrorism offences
</li>
<li>
Child sexual exploitation and abuse
</li>
<li>
Grooming
</li>
<li>
Harassment, stalking and abuse offences
</li>
<li>
Controlling or coercive behaviour offences
</li>
<li>
Drugs and psychoactive substances offences
</li>
<li>
Fraud and financial services offences
</li>
<li>
Foreign interference offence
</li>
</ul>
<div class="row">
<div class="col-12">
<div class="accordion mt-3">
<div class="accordion-item accordian-panel">
<div class="accordion-header" id="heading1">
<h2 class="accordion-header">
<button class="accordion-button accordion-head collapsed" type="button"
data-bs-toggle="collapse" data-bs-target="#collapseId1909" aria-expanded="false"
aria-controls="collapse1">
How the harms relate to the risk factor </button>
</h2>
</div>
<div id="collapseId1909" class="accordion-collapse collapse"
data-bs-parent="#myAccordion">
<div class="card-body">
<strong>
Terrorism offences
</strong>
<p>
User connections allow terrorism content to be disseminated through users’
networks, especially when official pages or channels are removed.
</p>
<strong>
Child sexual exploitation and abuse
</strong>
<p>
DESCR
</p>
<strong>
Grooming
</strong>
<p>
Functionalities that allow abusers to identify and make contact with children are
risk factors in the facilitation of grooming offences. User connections allow
perpetrators to establish contact with child users who have been identified and
begin communicating. The sense of trust that mutual connections can create may
also be exploited by perpetrators. Perpetrators can often use network recommender
systems in the form of publicly displayed connections list of children to
infiltrate groups of children at speed and utilise this as a tool to blackmail and
coerce children to further the sexual abuse.
</p>
<strong>
Harassment, stalking and abuse offences
</strong>
<p>
In some cases, perpetrators can leverage the user connections functionality by
connecting with second- and third-degree connections of the victim or survivor in
order to access content that is otherwise not publicly available. This gives a
perpetrator visibility of a target's profile without connecting with them
directly. User connections also enable perpetrators to build online networks which
can be leveraged to facilitate harassment and abuse. Individual perpetrators can
incite their network to join the abuse of an individual.
</p>
<strong>
Controlling or coercive behaviour offences
</strong>
<p>
User connections allow users to build online networks around the perpetrators as
well as the victims and survivors. These networks can extend perpetrators’ ability
to coerce and control victims and survivors, for example by creating an
environment for public humiliation or getting contacts to join in with monitoring
or harassment.
</p>
<strong>
Drugs and psychoactive substances offences
</strong>
<p>
Users often have to connect with potential dealers through user connections before
viewing their user profiles and associated content. It is also common for
suspected dealers to connect with one another which may provide another way for
users to find user profiles offering drugs for sale.
</p>
<strong>
Fraud and financial services offences
</strong>
<p>
Fraudsters will make use of people who have a large number of user connections to
achieve their aims.
</p>
<strong>
Foreign interference offence
</strong>
<p>
The use of coordinated networks on social media accounts can also be used to
amplify content and spread narratives across services. The functionality of user
connections is therefore a risk factor for this offence.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <span class="fs-sm">Does your service have any of the following functionalities that allow
users to communicate with one another?</span>
<div class="fs-sm fw-bold mb-3">Posting or sending images or videos through open or closed channels
</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">Posting images or videos</h4>
<p>
Posting images or videos can allow potential perpetrators to share illegal content with many
users in open channels of communication. Posting images is an important functionality in the
commission of image-based offences, including intimate image abuse, extreme pornography and
child sexual abuse material). In addition, image-based content can also facilitate other kinds
of harm. For example, users may be able to post memes that include terrorist content.
In addition, you should consider how potential perpetrators can post images or videos that
were edited – potentially using functionalities on user-to-user services. For example,
deepfakes can depict participants in legal pornography as children in image-based child sexual
abuse material.
</p>
<p class="fs-sm"> Key kinds of illegal harm </p>
<ul class="list-info">
<li>
Terrorism offences
</li>
<li>
Child sexual exploitation and abuse
</li>
<li>
Image-based child sexual abuse material
</li>
<li>
Encouraging or assisting suicide (or attempted suicide) offences
</li>
<li>
Controlling or coercive behaviour offences
</li>
<li>
Drugs and psychoactive substances offences
</li>
<li>
Extreme pornography offences
</li>
<li>
Intimate image abuse offences
</li>
<li>
Animal cruelty offences
</li>
</ul>
<div class="row">
<div class="col-12">
<div class="accordion mt-3">
<div class="accordion-item accordian-panel">
<div class="accordion-header" id="heading1">
<h2 class="accordion-header">
<button class="accordion-button accordion-head collapsed" type="button"
data-bs-toggle="collapse" data-bs-target="#collapseId3061" aria-expanded="false"
aria-controls="collapse1">
How the harms relate to the risk factor </button>
</h2>
</div>
<div id="collapseId3061" class="accordion-collapse collapse"
data-bs-parent="#myAccordion">
<div class="card-body">
<strong>
Terrorism offences
</strong>
<p>
Perpetrators often use functionalities such as posting and commenting on content
and hyperlinking to share and direct users to content including memes which
provide instructions related to terrorist activities. Our evidence points to these
functionalities increasing the likelihood of terrorism content being shared, and
the risks of harm to individuals exposed to this content. It can lead to
encouragement, incitement, the dissemination of material such as weapons training,
and the recruitment of people.
</p>
<strong>
Child sexual exploitation and abuse
</strong>
<p>
Descr
</p>
<strong>
Image-based child sexual abuse material
</strong>
<p>
The ability to post content, such as text and images, are also used by
perpetrators to share and distribute CSAM.
</p>
<strong>
Encouraging or assisting suicide (or attempted suicide) offences
</strong>
<p>
The ability to post content and re-post or forward content can allow users to
connect with others who are experiencing similar thoughts or behaviours in a
beneficial way. It can also be used to disseminate harmful suicide and self-harm
content.
</p>
<strong>
Controlling or coercive behaviour offences
</strong>
<p>
Posting content gives perpetrators the ability to publicly post negative or
personal information about victims and survivors as well as to non-consensually
share intimate images as part of campaigns of abuse.
</p>
<strong>
Drugs and psychoactive substances offences
</strong>
<p>
The ability to post content, in particular images and emojis, as well as post
goods and services for sale, have been identified as important functionalities in
the supply of drugs and psychoactive substances online as these can be used to
promote drugs and signpost potential buyers. User-generated content searching is a
popular way for users to find illicit drugs and psychoactive substances. Menus or
images depicting the products for sale can be posted on services or in closed user
groups.
</p>
<strong>
Extreme pornography offences
</strong>
<p>
Extreme pornography can be facilitated by posting content, in this case images and
videos, on user-to-user services.
</p>
<strong>
Intimate image abuse offences
</strong>
<p>
Intimate image abuse is primarily committed by posting images and videos where
perpetrators share intimate images non-consensually.
</p>
<strong>
Animal cruelty offences
</strong>
<p>
Descr
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <span class="fs-sm">Does your service allow users to post goods and services for sale?</span>
<div class="fs-sm fw-bold mb-3">Yes</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">Posting of goods and services for sale</h4>
<p>
Potential perpetrators may try to promote illegal goods or services by posting them for sale
using this functionality. Often illegal items such as drugs and firearms are posted for sale
using code names. In certain contexts, the ability to post goods or services for sale such as
through user-generated advertisements also enables potential perpetrators to advertise and
broadcast the sexual services of adults in exploitative environments. The risk of harm can be
increased if your services also allows users to make online payments directly.
</p>
<p class="fs-sm"> Key kinds of illegal harm </p>
<ul class="list-info">
<li>
Drugs and psychoactive substances offences
</li>
<li>
Firearms and other weapons offences
</li>
<li>
Sexual exploitation of adults offences
</li>
<li>
Fraud and financial services offences
</li>
</ul>
<div class="row">
<div class="col-12">
<div class="accordion mt-3">
<div class="accordion-item accordian-panel">
<div class="accordion-header" id="heading1">
<h2 class="accordion-header">
<button class="accordion-button accordion-head collapsed" type="button"
data-bs-toggle="collapse" data-bs-target="#collapseId1410" aria-expanded="false"
aria-controls="collapse1">
How the harms relate to the risk factor </button>
</h2>
</div>
<div id="collapseId1410" class="accordion-collapse collapse"
data-bs-parent="#myAccordion">
<div class="card-body">
<strong>
Drugs and psychoactive substances offences
</strong>
<p>
The ability to post content, in particular images and emojis, as well as post
goods and services for sale, have been identified as important functionalities in
the supply of drugs and psychoactive substances online as these can be used to
promote drugs and signpost potential buyers. User-generated content searching is a
popular way for users to find illicit drugs and psychoactive substances. Menus or
images depicting the products for sale can be posted on services, or in closed
user groups.
</p>
<strong>
Firearms and other weapons offences
</strong>
<p>
The ability to post goods or services for sale enables users to sell, market and
purchase firearms and weapons, while user-generated content searching can allow
them to find firearms and weapons.
</p>
<strong>
Sexual exploitation of adults offences
</strong>
<p>
The ability to post goods or services for sale, such as through advertisements,
also enables perpetrators to advertise and broadcast the sexual services of adults
in 179 exploitative environments.
</p>
<strong>
Fraud and financial services offences
</strong>
<p>
The functionality of posting goods and services for sale can enable fraudsters to
trick users into paying for goods and services that do not exist or are less
valuable than described.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div> <span class="fs-sm">Does your service have any of the following functionalities that allow
users to find or encounter content?</span>
<div class="fs-sm fw-bold mb-3">Searching for user-generated content</div>
<div>
<div class="block riskfactorpage ">
<div class="info-box">
<h4 class="fs-sm fw-bold">User generated content searching</h4>
<p>
The ability to search for user-generated content within services may allow users to find
illegal content and identify users to target on your service. For example, fraudsters may post
content relating to the supply of stolen bank details alongside advice on how to use them to
commit fraud which can be found by other users through content searching. Often, these posts
include combinations of keyword terms or hashtags to make it easier for users to find this
kind of content. Our evidence indicates that search results on user-to-user services can
include illegal content such as scams or extreme pornography, even when users are not actively
searching for it.
</p>