Search Results

122 results
  1. IWF Hash List

    Discover how IWF's Hash List uses unique digital fingerprints to help tech companies and law enforcement block known child sexual abuse imagery online.

  2. IWF connects to the Child Abuse Image Database (CAID)

  3. New IWF Member leads the way for VPN providers

    VPNWholesaler partners with IWF to block child sexual abuse material on its networks.

  4. URL List

    A list of webpages that we know contain pictures and videos of child sexual abuse so Members can block access.

  5. URL List Policy

    The principles and procedures under which the child sexual abuse content URL list is made available to members and under licence to specific non-members.

  6. URL Blocking: Good Practice

    Blocking access to child sexual abuse content by our Members is carried out on a voluntary basis and is a short-term disruption tactic which works alongside the removal of content at source.

  7. URL blocking FAQs

    FAQs about our dynamic URL List, a comprehensive list of webpages where we’ve confirmed images and videos of child sexual abuse. All IWF Members can use this List, under licence, so that they can block access to these criminal webpages.

  8. Keywords List

    A unique list of words, phrases, and codes offenders may use to conceal child sexual abuse imagery on legitimate networks and platforms.

  9. Meet Andrew Puddephatt, the Internet Watch Foundation’s new Chair

  10. Internet Watch Foundation appoints Andrew Puddephatt as its Independent Chair

  11. Celebrating the people that make IWF great - Henry: I was able to gather identifying information on a victim by analysing a video that was reported to us

  12. Celebrating the people that make IWF great – Tess: Telling people that you work in policy is usually met with a slightly glazed look