Exploring Future-Generation Internet Privacy Governance Frameworks


14:00-14:05  Introduce
14:05-15:45  Panel Discussion

  • Moderator
    – Liu Hui-Wen, Professor, Department of Journalism, National Chengchi University
  • Panelists:
    – Wang Yi-Fan, Member of the Executive Yuan’s Task Force on Child Welfare and Rights Promotion、Student of Taichung Municipal Chung Gang Senior High School
    – Liu Yu-Jun, Executive Secretary, Institute of Watch Internet Network
    – Dai Zhi-He, Sub-Lieutenant, Taipei City Police Department, Women and Children’s Protection Division

15:45-16:00  Q&A


Meeting Minutes
Wang Yi-Fan, (Member of the Executive Yuan’s Task Force on Child Welfare and Rights Promotion、Student of Taichung Municipal Chung Gang Senior High School)

Ms. Wang Yi-Fan clearly pointed out that in the digital age, information circulates rapidly, and technology is highly advanced. However, this has also given rise to the issue of privacy breaches. Currently, digital privacy education in schools is not comprehensive, leading to students having only a partial understanding of the consequences of privacy breaches. Often, by the time students become aware of privacy issues, the breach or exposure has already occurred. Parents also contribute to the vulnerability of children’s privacy, as they may share details about their children on social media, leading to unintentional privacy leaks. Additionally, when parents assist in enrolling their children in courses, information may unintentionally leak due to the completion of registration details.

Drawing from personal life experiences, Ms. Wang illustrated instances where children neglect privacy while using the internet, including:

  • Under peer influence, children download and use mobile games, during which they provide personal information such as name, email, phone number, and age, leading to privacy leaks.
  • With the popularity of short video apps in recent years, children imitate interesting videos or challenges they see, sometimes revealing private information such as location.
  • As children grow older, they download social apps to meet friendship needs. Compared to regular apps, social apps often request more information, exacerbating the risk of privacy breaches. Children, trusting online friendships, may engage in further communication with online friends, resulting in adults obtaining a considerable amount of children’s privacy, leading to the leakage of private images.
  • In educational environments like schools, government or companies collaborate with schools to provide educational platforms for children. Although these platforms serve as educational resources, the personal information provided during registration may leak to the platform and companies.
  • Teachers often use the internet to send messages when announcing assignments or class matters. If these messages are not encrypted, students’ email and basic information may be at risk of leakage.
  • Teachers, students, or parents often screenshot and share information without consent, leading to privacy breaches.

She emphasizes that to protect children’s digital privacy, children must be aware of the importance of privacy and recognize the potential for privacy breaches in everyday events. Privacy awareness should be instilled by both schools and parents. While schools have started promoting information and media literacy (such as advising students not to upload sensitive photos and videos), there is insufficient focus on privacy breaches related to app usage. Parents, who may not be familiar with internet privacy issues, need to enhance their awareness of relevant topics to provide digital privacy education for their children.

Ms. Wang believes that when constructing digital privacy policies, the voices and perspectives of children should be taken into account.


Liu Yu-Jun (Executive Secretary, Institute of Watch Internet Network)

Ms. Liu Yu-Jun first outlined common online threats faced by children, including cyberbullying, online enticement, online scams, and the leakage of intimate images. These threats are closely related to privacy disclosure, as explained below:

  • Cyberbullying incidents, when posted online, often lead to doxxing of the bully. Using mosaic to protect the identity of the individuals involved in the video can mitigate subsequent effects.
  • Perpetrators of online enticement need to possess information about the victim’s location and age to carry out their actions.
  • Online scams typically involve the exchange of information.
  • If the identity information of the subject of intimate images remains undisclosed, it becomes challenging for malicious individuals to threaten the victim.

Ms. Liu then proceeded to introduce common patterns of children’s privacy leaks:

  • Self-disclosure on social media: Children introduce themselves and showcase their lives on platforms like Facebook, but excessive information sharing may make them targets for doxxing.
  • Selfies and posts: Selfies can lead to the leakage of personal images, names, and even student IDs; posting check-ins may disclose personal whereabouts.
  • Voluntary provision of information: Children providing information during online interactions may be vulnerable to online enticement, as individuals with malicious intent can extract details about the child’s school, address, age, and family members through conversation.
  • Exposure or doxxing: Detailed sensitive information about children may be provided by relatives or friends, leading to the leakage of personal information.
  • Adding strangers as friends: Social media or networking platforms recommend friends through algorithms. When accepting friend requests from strangers, privacy may be compromised through chat conversations.

Among all patterns of children’s privacy leaks, the leaking of intimate images is the most dangerous. According to a survey conducted by iWin in 2022, children who actively send personal intimate images are more likely to experience harassment due to personal information leakage, parents sharing information or whereabouts on Facebook, being doxxed or publicly criticized online, or facing bullying or malicious comments on social media. This situation is also observed in children whose sexual content has been leaked.

Regarding doxxing methods, malicious individuals may use both Chinese and English names, keywords, people search engines, work experience, email addresses, educational background, and various online platforms such as PTT, Instagram, Facebook, and Dcard. The speaker emphasized that once digital footprints are on the internet, they may exist indefinitely and should be handled with caution.

Online platforms bear the significant responsibility of safeguarding the digital privacy of children. Their obligations include formulating reasonable and transparent privacy terms, making privacy settings public, easily accessible, and clear, defaulting to the highest privacy protection for children’s accounts, and providing effective reporting and response channels. However, platforms face challenges in children’s digital privacy protection, such as the lack of an effective, widely accepted age verification mechanism, difficulty in balancing data collection to avoid invasion while ensuring accurate user age confirmation, and resource constraints for smaller platforms in developing privacy protection mechanisms.

As for how individuals can protect their own digital privacy, the speaker provided the following recommended measures:

  • Enhance privacy settings on social media accounts.
  • Exercise caution when sharing and disable location permissions in applications.
  • Differentiate between official and personal accounts.
  • Avoid using social media on public devices.
  • Change passwords regularly.
  • Use two-factor authentication.

Avoid clicking on suspicious links.


Dai Zhi-He  (Sub-Lieutenant, Taipei City Police Department, Women and Children’s Protection Division)

Mr. Dai Zhi-He, approaching the issue from a law enforcement perspective, shared observations on cases of intimate image leaks involving children. He addressed common tactics used in sexual image enticement, the reasons behind such leaks, post-incident protection measures for victims, evidence collection items and key points for victims, precautions during evidence collection, and law enforcement challenges. Mr. Dai emphasized that despite Taiwan’s strengthened legal penalties under the “Child and Youth Sexual Exploitation Prevention Act,” strict laws have not effectively deterred crimes of sexual exploitation against minors, as indicated by statistical data.

Common Tactics in Sexual Image Enticement:

  • Perpetrators posing as the same gender, requesting victims to provide sexual images under the guise of comparing body shapes.
  • Perpetrators posing as talent scouts, asking victims to showcase their physique.
  • Perpetrators using false lingerie advertisements or opportunities for endorsements of intimate care products, requesting victims to provide sexual images.
  • Perpetrators pretending to be in a relationship with the victim or using disguised attractive individuals to solicit photos.
  • Perpetrators using in-game currency, equipment, or weapons as incentives to persuade victims to capture sexual images.
  • Perpetrators using monetary incentives to coerce victims into capturing sexual images.

Reasons Behind Sexual Image Leaks:

  • Prevalence of social and networking apps, especially during the the COVID-19 epidemic.
  • Victims seeking emotional attachment, recognition, and praise.
  • Insufficient understanding and recognition of sexual images by victims.
  • Varied and evolving methods employed by perpetrators.

Post-Incident Protection for Victims:

  • Victims should preserve evidence, not delete chat records, and avoid blocking the perpetrator for initial evidence collection by law enforcement.
  • Victims should report the incident immediately to increase the chances of apprehending the suspect before or during the initial spread of the video.
  • Avoid letting victims face the issue alone. Parents should provide support and accompany the victim when reporting the incident to prevent the victim from complying with the perpetrator’s instructions to deliver money or meet in person.
  • Notify platforms to take down the video. In the first instance of encountering a leaked sexual video, victims should refrain from taking any action before completing the report and evidence collection. If the video has already been spread, law enforcement can assist in taking it down and reporting.

Evidence Collection Items and Key Points for Victims:

  • Recording the time of video capture.
  • Noting the account and ID of the video poster.
  • Recording the IP address of the video poster (if available).
  • Documenting the content and link of the posted video.
  • Using screen captures to collect evidence, as many platforms and apps have limited-time dynamic or one-time view features.

Precautions During Evidence Collection:

  • Safeguarding sexual privacy images to prevent their leakage during the reporting process, transfer, or archiving.
  • Avoiding the deletion of data or blocking the perpetrator out of fear, making it difficult for law enforcement to trace.
  • Turning off location services before reporting to prevent the perpetrator from tracking the victim’s whereabouts.
  • Refraining from provoking the perpetrator or making public statements after reporting.
  • Discouraging the victim from handling the issue alone or concealing it, which may lead to further mistakes.

Law Enforcement Challenges:

  • Some leaked sexual images are hosted on overseas platforms, beyond the jurisdiction of Taiwanese law enforcement, making data retrieval difficult.
  • Even with access to data, the IP addresses of video distributors are often located abroad, making it challenging to trace.
  • While law enforcement can access some data, platform operators may provide limited information.
  • Sensitivity and empathy of case handlers may be insufficient. Past cases have seen instances where law enforcement notified suspects to come forward for questioning, giving suspects time to destroy evidence.

Mr. Dai concluded by advising parents to understand the apps and mobile games commonly used by teenagers and pay attention to live streaming platforms, as these sites are prone to incidents of sexual image leaks.

Presentation Download <Provided with the consent of the speaker>

– Wang Yi-Fan (Member of the Executive Yuan’s Task Force on Child Welfare and Rights Promotion、Student of Taichung Municipal Chung Gang Senior High School) – Presentation Download
– Liu Yu-Jun (Executive Secretary, Institute of Watch Internet Network) – Presentation Download
– Dai Zhi-He (Sub-Lieutenant, Taipei City Police Department, Women and Children’s Protection Division) – Presentation Download



14:00-14:05  活動介紹
14:05-15:45  焦點座談

  • 主持人:劉慧雯教授  (政治大學新聞系)
  • 與談人:
    – 王乙帆 同學(行政院兒童及少年福利與權益推動小組委員、臺中市高級中等教育階段非學校型態實驗教育學生)–線上
    – 劉昱均 執行秘書(iWIN 網路內容防護機構)
    – 戴志和 分隊長(臺北市政府警察局 婦幼警察隊)

15:45-16:00  現場問答



王乙帆 同學(行政院兒童及少年福利與權益推動小組委員、臺中市高級中等教育階段非學校型態實驗教育學生)



  • 同儕影響下,孩子下載並使用手機遊戲,於過程中填寫姓名、電子郵件、電話號碼、年齡等資料,導致隱私外流。
  • 近年短影音程式流行,當兒少看到此類有趣影片或挑戰時,即嘗試揣摩、模仿,甚至翻拍影片上傳,而這些影片會暴露地理位置等隱私資訊。
  • 隨年紀漸長,兒少為滿足交友需求而下載交友軟體,相較於一般程式,交友軟體經常向使用者索取更多資訊,導致隱私外流情況更加嚴重。孩子往往對隱私外流無感,加上其信任網路交友,因此經常與網友進一步交流,導致成人網友掌握諸多兒少隱私,造成私密影像外流。
  • 學校等教育環境中,政府或企業會與學校合作,提供教育平臺供孩子使用,雖然這類平臺確為教育資源,但註冊時提供的個資,亦可能外流給平臺與企業。
  • 老師在公布作業或班級事務時,經常運用網路統一發送訊息,若訊息未加密,學生電郵和基本資料恐外洩。
  • 師生或父母很常在未經同意的情況下截圖分享資訊,導致隱私外流。

講者強調,若要保護兒少數位隱私,孩子須能感知隱私重要性,並意識到日常事件中的隱私外洩可能性。隱私意識的啟蒙來自學校與父母,學校雖已開展資訊媒體素養宣導(例如告誡學生勿上傳敏感照片與影像 ),但對於使用App時的隱私外流議題未有太多著墨。家長對網路隱私議題並不熟悉,亟須加強對相關議題的認知,方能為孩子提供數位隱私教育。



劉昱均 執行秘書(iWIN 網路內容防護機構)


  • 霸凌事件被拍成影片置於網路後,霸凌者往往遭遇肉搜,倘若影片使用馬賽克保護當事人,可避免後續效應。
  • 交友誘騙加害人須掌握被害人居住地點、年齡等資料,方能下手。
  • 網路詐騙須透過資訊交換進行。
  • 若私密影像主角身分資訊未外流,有心人士將難以威脅受害者。


  • 社群媒體中的自我揭露:孩子透過Facebook等社群媒體自我介紹並展現自我,當過多個資公開,恐遭有心人士用於肉搜。
  • 自拍和PO文:自拍導致個人影像、姓名甚至學號外流;PO文打卡恐造成個人行蹤外洩。
  • 自主提供:孩子在交友時向對方提供資訊,此情況恐發生於交友誘騙,有心人士可透過對話套出孩子就讀學校、住址、年齡與家庭成員等個資。
  • 遭爆料或肉搜:孩子的詳細敏感資訊甚至由親朋好友提供,導致個資外洩。
  • 陌生加好友:社群媒體或交友平臺透過大數據與演算法機制向孩子推薦好友,當加入陌生好友時,隱私可能透過聊天對話外流。






戴志和 分隊長(臺北市政府警察局 婦幼警察隊)


  • 加害人假裝同性,以比對雙方身材為由要求被害人提供性影像。
  • 加害人假裝星探,要求觀察被害人體態。
  • 加害人透過虛假內衣廣告或私密處保養品代言機會,要求被害人提供性影像。
  • 加害人佯裝與被害人交往或透過假扮帥哥美女索要照片。
  • 加害人以兌換遊戲點數、裝備或武器為誘因,要求被害人拍攝性影像。
  • 加害人以金錢誘惑被害人拍攝性影像。


  • 交友軟體盛行(尤其疫情期間)。
  • 被害人具有情感依附需求,渴望認同與稱讚。
  • 被害人對性影像的認知與辨識能力不足。
  • 加害人誘拐管道與手法多變。


  • 被害人須保留證據,勿刪除對話紀錄和封鎖對方,如此警方才能初步蒐證。
  • 被害人受害後應立即報案,如此才有機會在影片散佈前或散佈之初迅速抓到嫌犯。
  • 避免讓被害人獨自面對問題。家長需關懷、陪同報案,避免被害人獨自聽從加害人指示交付金錢或赴約見面。
  • 影片下架須通報。當首次遇到性影片外流時,被害人不應於完整報案蒐證前進行任何動作;若影像非首次散佈,為避免危害,警方可協助被害人將影像下架並通報。


  • 影像攝錄時間。
  • 影像張貼者帳號與ID。
  • 影像張貼者IP位址(若有)。
  • 張貼內容與連結網址。
  • 透過螢幕截圖進行蒐證,許多網站與應用程式都設有限時動態或一次性觀看資訊,應隨時截圖。


  • 注意性隱私影像保存,避免在報案程序、傳遞過程或檔案歸檔後造成影像外流。
  • 勿因恐懼而刪除資料或封鎖對方帳號,導致警方不易追查。
  • 報案前關閉定位軟體,讓報案行蹤無法被嫌犯掌握。
  • 報案後勿挑釁加害人或到處放話。
  • 被害人勿具有獨自面對或隱瞞問題心態,而造成更大錯誤。


  • 部分性影像外流於境外平臺,非我國司法管轄權所及,導致警方無法調閱資料。
  • 警方雖可調閱資料,但影像散佈者IP位於境外,難以追查。
  • 警方雖可調閱資料,但平臺業者提供資料有限。
  • 案件處理人員敏感度與同理心不夠,過去案例中,曾發生警方通知嫌犯到案說明,反倒讓嫌犯有時間湮滅證據之情況。



– 王乙帆 同學(行政院兒童及少年福利與權益推動小組委員、臺中市高級中等教育階段非學校型態實驗教育學生)- 簡報下載
– 劉昱均 執行秘書(iWIN 網路內容防護機構)- 簡報下載
– 戴志和 分隊長(臺北市政府警察局 婦幼警察隊)- 簡報下載