Skip to content

bar

Workplace Giving & Matching

Workplace giving can be an easy and convenient way to support the causes you care about – and your company may even match your gifts. Explore now. 

Heart balloon in a jar of coins

Get the Facts About COCSA: Child-on-Child Sexual Abuse

Learn to identify child-on-child sexual abuse (COCSA) and what steps to take if you believe a child has sexually abused another child. 

Person using a laptop to read the news, on a purple background

Get the Facts About Drug-Facilitated Sexual Assault

Learn about drug-facilitated sexual assault: how it’s perpetrated, the common warning signs, and why survivors are never to blame.

Hands typing on a cellphone.

Get the Facts About Incest: Sexual Abuse by a Family Member

Learn what sexual abuse by a family member—also known as incest—looks like, why it’s so harmful, and how survivors can find support and healing.

Hands typing on a cellphone.

Get the Facts About Intimate Partner Sexual Violence

Learn what intimate partner sexual violence is, how to recognize it, what to do next, and how to support a survivor. Confidential help is available.

Get the Facts About Sexual Abuse by Medical Professionals

Learn to recognize sexual abuse by medical professionals, what you can do to keep yourself safer, and how to report misconduct. 

A doctor holds a stethoscope around his neck.

What is CSAM?

CSAM (“see-sam”)refers to any visual content—photos, videos, livestreams, or AI-generated images—that shows a child being sexually abused or exploited.

Who Is Victimized by CSAM?

The victims of CSAM are real children. Most are very young kids who deserve safety, dignity, and a future free from the trauma of sexual violence.

How Does CSAM Get Distributed?

Once CSAM is created, it can spread across the internet in seconds. For innocent victims, CSAM can be nearly impossible to track and even harder to erase.

What About AI-Generated CSAM—Like Deepfakes?

Artificial intelligence (AI) is fueling a disturbing rise in synthetic CSAM—child sexual abuse material generated by easy-to-use apps and software.