25% off on anonymous reporting and safeguarding tools for schools - click to find out more

What Is the NCII Register?

What Is the NCII Register?

Intimate image abuse happens when private photos or videos are shared, threatened to be shared, or uploaded online without someone’s consent. If images or videos are shared without consent, the content is then classified as non-consensual intimate imagery (NCII). It’s a serious form of harm that can destroy trust, privacy and wellbeing. And unfortunately, the internet makes it extremely easy for this content to spread far and fast. Therefore, to tackle this problem more effectively across a global scale, we are calling for a regulated NCII Register.

What Is an NCII Register?

A Non-Consensual Intimate Image (NCII) Register would be a central, lawful list of digital fingerprints (hashes) of intimate images that have been shared without consent. It wouldn’t contain the images themselves, just their unique digital “codes.” This makes it safe and private for the individual whilst still allowing the content to be escalated for removal purposes.   

These hashes work like barcodes:

  • Images or videos are turned into a unique fingerprint.
  • Online platforms and services can then check uploaded content against this list.
  • If a match is found, the system flags the content and it can be blocked or taken down quickly.

How Would It Work in Practice?

Here’s a step-by-step guide of how the Register would operate:

  1. Individuals would choose to add their hashes - People affected by NCII would be able to generate a hash of their image without ever uploading the actual photo or video.
  2. Verified cases of NCII can be added by the courts too - In cases where the image has been legally confirmed as non-consensual, courts could add hashes to the Register.
  3. Online platforms have access to the register - Social networks, apps, search engines and hosting services would check all new uploads against the Register. If there’s a match, the content can be stopped before it gains traction.
  4. Blocking and removal is faster and more consistent - Instead of reporting the same image again and again across different platforms, one register means the image can be blocked everywhere at once.
  5. Governance and safeguards - A regulator would oversee the register to make sure it’s used responsibly, protects privacy, and stops misuse.

Why This Would Make a Significant Difference

At the moment, takedown systems depend on each company’s own reporting process. That means harmful content can still float around in places that don’t act quickly, or even at all. A regulated NCII Register aims to change that by:

  1. Stopping re-uploads before they spread
  2. Reducing repetitive reporting for victims
  3. Making protections consistent across all platforms
  4. Encouraging a new global standard of protection

This also builds on tools already in use, like our own StopNCII.org, an online prevention tool where people can create hashes of their own images. Through StopNCII.org, participating tech companies already use those hashes to prevent known NCII from being shared so it is clear, solutions such as these are effective.

A Survivor-Focused Solution

Importantly, the NCII Register is designed to be consent-centred and protective of privacy. It wouldn’t store intimate content, only hashes created with consent or legal verification. That means survivors keep control, and their privacy is respected.

The proposed NCII Register is a centralised initiative that could help stop intimate images being shared without consent across a global scale. By using secure hashes, clear governance, and global cooperation, it aims to make online spaces safer and reduce the harm caused by NCII abuse.

Back to Magazine

Related Articles