Businesses’ use of technologies to protect their IT environment from child sexual abuse material
- Eight in ten businesses have technology in place.
- Six in ten companies use filter solutions.
- One in ten companies have found child sexual abuse material.
Eight in ten businesses have technology in place
There are different technologies available to prevent child sexual abuse material being viewed, stored or distributed in the business IT environment or on company devices. These include different blocking tools (often in filter solutions) and detection tools. An overview of technologies used to detect and stop child sexual abuse material is outlined in section three of this report.
More than eight in ten businesses stated that they have technology in place to detect or block child sexual abuse material in the business IT environment.
Six in ten use filter solutions
Six in ten of the surveyed businesses reported that they use some kind of filter solution to protect their IT environment from child sexual abuse material.
“ Various blocking and filtering technologies.”
“ Internal firewall, software to block browser sites.”
More than one third specified that they use filter solutions as part of an employee monitoring tool, such as Hubstaff, Teramind, BrowseReporter or SentryPC. Employee monitoring tools are used to track employee web or application use, monitor chats and keystrokes, and to also filter and make specific types of online content inaccessible.
One in ten use detection solutions
More than one in ten of the surveyed businesses stated that they use detection technologies to protect their IT environment from child sexual abuse material.
“ Technologies that detect this type of material and alert us, so we can react properly.”
One in twenty of the respondents reported that they use antivirus solutions. One in twenty also responded that they use different kinds of physical protection instead of IT solutions (such as surveillance cameras, microphones or physical law enforcement protection present).
“ Cameras, Microphones, etc.”
Nearly one in ten of the respondents gave unclear answers, such as enterprise resource planning (ERP) systems or protocols that are used when children go physically missing.
One in ten have no technology in place
More than one in ten of the surveyed businesses reported that they don’t have technology in place to detect or block child sexual abuse material. When asked why, they primarily answered that they are unaware of technology that can detect or block child sexual abuse material, that it can be done manually or that they are of the opinion that this kind of material does not appear in business networks, and that they therefore do not need to protect their IT environment.
“ I am not aware of such technologies.”
“ It can be done manually.”
“ Because we don’t think that this happens on company networks.”
One in ten companies have found material
One in ten businesses reported that they have found child sexual abuse material in the business IT environment. They reported having found the material in a wide variety of ways; by IT specialist in different check-ups or IT scans, by someone else reporting it to IT, or with the help of technology.
Nearly nine in ten respondents reported that they have not found child sexual abuse material in their IT environment.
Important to note is that it is customary in organisations to keep information about cases where an employee has been found to handle child sexual abuse material to a very tightly defined and limited group. Therefore, the results most likely reflect whether child sexual abuse material has been found in the particular region and during the time that the respondent has been in his or her current position.
Law enforcement was notified and employee fired
In cases where child sexual abuse material had been found in the respondents’ organisations, the surveyed businesses answered that they handled it by notifying law enforcement, conducting an internal investigation, and firing the employee.
Share of businesses that report having technology in place to detect or block child sexual abuse material in the organisation’s IT environment
Breakdown of the different technologies that businesses report using to detect or block child sexual abuse material
Breakdown of the different reasons reported for why technologies are not being used to detect or block child sexual abuse material
Share of businesses that report having found child sexual abuse material in the organisation’s IT environment
Breakdown of how the situation was handled by the organisation