From pain to empowerment the journey starts now

Forms of child sexual abuse

Child sexual abuse takes many forms, which often occur at the same time.

Forms of child sexual abuse

Some forms of child sexual abuse include (but are not limited to):

  • Exhibitionism, or exposing oneself to a minor
  • Fondling
  • Intercourse
  • Masturbation in the presence of a minor or forcing the minor to masturbate
  • Obscene conversations, phone calls, text messages, or digital interaction
  • Producing, owning, or sharing pornographic images or movies of children
  • Sex of any kind with a minor, including vaginal, oral, or anal
  • Sex trafficking
  • Any other contact of a sexual nature that involves a minor.

 

What do perpetrators of child sexual abuse look like?

The majority of perpetrators are someone the child or family knows. As many as 93 percent of victims under the age of 18 know the abuser. A perpetrator does not have to be an adult to harm a child. They can have any relationship to the child including an older sibling or playmate, family member, a teacher, a coach or instructor, a caretaker, or the parent of another child.

Abusers can manipulate victims to stay quiet about the sexual abuse using a number of different tactics. Often an abuser will use their position of power over the victim to coerce or intimidate the child. They might tell the child that the activity is normal or that they enjoyed it. An abuser may make threats if the child refuses to participate or plans to tell another adult. Child sexual abuse is not only a physical violation; it is a violation of trust and/or authority.

How can I protect my child from sexual abuse?

Online sexual exploitation and sexual abuse of children

Children seem to represent a primary group of victims of cyberviolence, in particular with respect to online sexual violence.

While the “online sexual exploitation and sexual abuse of children” are not necessarily new and distinct forms of sexual exploitation and sexual abuse of children, ICTs have increased the accessibility to children by persons looking to sexually abuse and exploit them. ICTs facilitate the sharing of images and videos of the sexual abuse and thus reinforce the long-lasting harmful impact of the abuse of children. ICTs also contribute to making commercial gains from sexual exploitation of children easier. ICTs however do not, in and by themselves, give rise to distinct types of sexual offences against children.

Online sexual exploitation and sexual abuse of children includes the behaviour listed in articles 18 to 23 of the Lanzarote Convention and in article 9 of the Budapest Convention in an online environment or otherwise involving computer systems:

Sexual abuse (article 18), that is, “a) engaging in sexual activities with a child who, according to the relevant provisions of national law, has not reached the legal age for sexual activities; or b) engaging in sexual activities with a child where:
use is made of coercion, force or threats; or
abuse is made of a recognised position of trust, authority or influence over the child, including within the family; or
abuse is made of a particularly vulnerable situation of the child, notably because of a mental or physical disability or a situation of dependence.“
Child prostitution (article 19), that is, “a) recruiting a child into prostitution or causing a child to participate in prostitution; b) coercing a child into prostitution or profiting from or otherwise exploiting a child for such purposes; or c) having recourse to child prostitution.”
Child pornography (article 20), that is, “a) producing child pornography; b) offering or making available child pornography; c) distributing or transmitting child pornography; d) procuring child pornography for oneself or for another person; e) possessing child pornography; f) knowingly obtaining access, through information and communication technologies, to child pornography”. “Child pornography” shall mean any material that visually depicts a child engaged in real or simulated sexually explicit conduct or any depiction of a child’s sexual organs for primarily sexual purposes.
Corruption of children (article 22), that is, “the intentional causing, for sexual purposes, of a child who has not reached the age [below which it is prohibited to engage in sexual activities with a child] to witness sexual abuse or sexual activities, even without having to participate”.
Solicitation of children for sexual purposes (article 23) – also called “grooming” – that is, “the intentional proposal, through information and communication technologies, of an adult to meet a child who has not reached the age set [below which it is prohibited to engage in sexual activities with a child] for the purpose of committing any of the offences established in accordance with article 18, paragraph 1.a [engaging in sexual activity with a child], or article 20, paragraph 1.a [producing child pornography], against him or her, where this proposal has been followed by material acts leading to such a meeting”.
Online sexual exploitation and sexual abuse are major forms of cyberviolence targeting children.

Computer systems may be used in connection to rape and other acts of sexual violence, or extortion.

This website uses cookies to ensure you get the best experience on our website.

Skip to content