Course Overview

The explosion of information and communication technology has created unprecedented opportunities for children and young people to communicate, connect, share, learn, access information and express their opinions on matters that affect their lives and their communities. But wider and more easily available access to the Internet and mobile technology also poses significant challenges to children’s safety – both online and offline. To reduce the risks of the digital revolution while enabling more children and young people to reap its benefits, governments, civil society, local communities, international organizations and the private sector must come together in common purpose.

The technology industry has a critical role to play in establishing the foundations for safer and more secure use of Internet based services and other technologies – for today’s children and future generations. Businesses must put protecting children at the heart of their work, paying special attention to protecting the privacy of young users’ personal data, preserving their right to freedom of expression, and putting systems in place to address violations of children’s rights when they occur. Where domestic laws have not yet caught up with international law, business has an opportunity – and the responsibility – to bring their business practices in line with those standards. (Guidelines for industry on child online protection, UNICEF 2015).

African children are faced with enormous challenges with regards to access and use of the internet with studies on child safety and security indicating that a quarter of African children with internet access are exposed to sexually explicit materials with only 24 percent of the children reporting such incidences.

Child online protection has become a global concern attracting several organizations like ITU, UNICEF, GSMA and the Communications Authority of Kenya (CA) leading to such organizations engaging in various campaigns as a way of creating awareness. Despite these efforts, there is a still a huge knowledge gap on how to address issues associated with Child Online Protection.

 

Download Training Programme

Pain Points

With advancement of Technology, children are exposed to devices connected to the Internet and their Safety Online is not guaranteed. This course will prepare stakeholders to take their specific roles on how to protect children online.

Workshop Objectives

  • To learn what is known about children’s use of communication devices,
  • To understand the law related to online child exploitation
  • To learn the technical and procedural measures on breach of child online protection
  • To address the capacity building necessary for a full-proof child online protection society
  • To address the infrastructure necessary at national levels to ensure child online safety
  • To table possible international collaborations on the issue

 

Workshop Learning Outcomes

  • Be able to known about children’s use of communication devices,
  • Understand the law related to online child exploitation
  • Knowledge on technical and procedural measures on breach of child online protection
  • Know the required infrastructure necessary at national levels to ensure child online safety.

 

Course Content/Topics

1. Child online Protection – Introduction.

2. What the law says about the COP.

3. Types of online crimes

a) Solicitation of a minor.
b) Cyber bullying,
c) Chat room.
d) Child Pornography.

    • Nudity
    • Erotic Posing.
    • Explicit Sexual Activity.

 

4. Internet Addiction.

a) Signs of addiction.
b) Stages of addiction

    • Curiosity
    • Substitution satisfaction.
    • Escape from the world.

 

5. Guidelines to prevent online addiction.

a) Safe Online Tips for children.
b) Setting your limits.
c) Meeting Online/ Friends offline.
d) Accepting Invitation/ Friendship.
e) Reaction.
f) Telling someone about your concerns.

6. Safe Online tips for parents/Teachers/Guardians.

7. Combating Online Child Sexual abuse.

8 The importance of clear legislation framework on Child protection.

9. Enabling effective collaboration between

a) Hotlines
b) Law Enforcement
c) Industry
d) NGOs. Help lines and other support services.

10. Technical solutions to prevent re – victimization of victims through online images,

a) Options
b) Issues
c) Requirements in terms of processes, legislation.

11. Introduction to Security (CSCU)

a) Securing Operating Systems
b) Malware and Antivirus
c) Internet Security
d) Security on Social Networking Sites
e) Securing Email Communications
f) Securing Mobile Devices
g) Securing the Cloud
h) Securing Network Connections
i) Data Backup and Disaster Recovery

 

Training Methodology
A mixture of virtual online training and self-paced training.

a) Interactive Live Classroom Sessions
Live interactive classroom sessions will be conducted on Skype. Skype will enable students and Instructors to engage in video conferencing, send instant messages and share files with the participants during the training sessions. The tool is available on mobile devices, computers or tablets.

b) AFRALTI Online Learning Management Platform
This training will be delivered on AFRALTI online learning management platform built on Moodle. Moodle is one of the best learning platforms designed to provide educators, administrators and learners with a single robust, secure and integrated system to create personalized learning environments.

 

Download Training Programme

Target Audience

Kenya Citizens

  • Primary and High school teachers
  • Parents
  • Social workers
  • Law enforcement agencies
  • Telecom operators
  • NGO staff working closely with children
  • Persons Living With Disabilities (PWDs)
  • Media practitioners
  • Church leaders
  • Broadcasting houses
  • Content service providers
  • Application service providers

 

The scope covering various Government departments will ensure comprehensive handling of Child online protection for all major stakeholders. The parents will be sensitised on the threats that face their children online and how to mitigate such harm. Security and Judicial officers will be aided in investigating and prosecuting crimes involving minors.

System Requirements for the Students Computers

  • Windows 10 Desktop Systems or Mac OS X 10.10
  • RAM of 8GB
  • Core i5 processor
  • We recommend a speed of 5 Mbps for the interactive sessions, access to AFRALTI e-learning platform and for other learning activities.

 

Certification
Upon completion of the training, the attendees will receive AFRALTI certificate.

CohortDatesDurationLocation
Cohort 115th Jan - 9th Feb 20244 WeeksONLINE (Zoom & AFRALTI Online Academy)
Cohort 212th Feb - 8th Mar 20244 WeeksONLINE (Zoom & AFRALTI Online Academy)
Cohort 34th Mar - 29th Mar 20244 WeeksONLINE (Zoom & AFRALTI Online Academy)
Cohort 41st April - 26th April 20244 WeeksONLINE (Zoom & AFRALTI Online Academy)
Cohort 529th April - 24th May 20244 WeeksONLINE (Zoom & AFRALTI Online Academy)

Checkboxes