Internet Safety For Kids

Size: px
Start display at page:

Download "Internet Safety For Kids"

Transcription

1 Protecting the family online Independent research and report

2 2 Introduction In April 2012, the findings of an Independent Parliamentary Inquiry into Online Child Protection, looking into the impact of the internet on children under the age of 16, were published. The background to this Inquiry and the resultant report and recommendations, have led to a widespread call for Internet Service Providers (ISPs) to either self-regulate and provide filters, or for the government itself to step in and regulate the industry as a whole. While it is not Claranet Soho s position to comment on this legislative process, it has commissioned independent research to identify just how important this issue is for parents in the UK and what, if anything, parents are actively looking for with respect to the provision of internet services in the domestic environment. In the introduction to its report, the Independent Parliamentary Inquiry makes clear the background to the issue: With no central point of management or control of the internet at global, regional or national level, and millions of new websites emerging every year, many in the internet industry suggest that it is easier to tackle the problem of children seeing undesirable content by using filters installed on individual computers so-called device level filters rather than blocking content at a network level. It goes on to say: Many feel that device-level filters are no longer offering sufficient protection for children online. Only a minority of parents use these filters and this number is falling. An explosion in the number of internet-enabled devices makes the process of individual device protection even more arduous. Children spend increasing amounts of time online, are often more tech savvy and knowledgeable than their parents and know how to circumvent or avoid device filters. The Parliamentary Inquiry, headed by Claire Perry MP, included a proposal for a formal consultation on the introduction of an opt-in network-level filtering system for all internet accounts. The default setting for pornography would be off, and it would be restored only after strict age verification for those over 18. This therefore is not censorship, despite howls of protest from some quarters about freedom of speech, and offers the best protection for children.

3 3 Network-level filters are particularly important as most parents are just not up-to-speed with the pace of technological change or the type of hardcore, violent and abusive material their children can now access. With the best will in the world, many parents struggle to install device-level filters and are lagging behind their tech-savvy children. The problem is only likely to get worse with the proliferation of the latest must-have smartphones being used by children. To-date, TalkTalk is the only ISP which is delivering a package that filters at the network level, although the default is automatically on and parents would still have to opt to block pornographic content. TalkTalk has also recently decided to extend this service to all its existing customers, not just its new customers, as is the case with the other large ISPs such as BT, Virgin Media and Sky. The four largest ISPs have developed a new Code of Conduct and have agreed to implement new Active Choice controls, where the consumer must actively choose whether to install device-level filters as part of the account set up process. However, this will not take place until October Childsafe Claranet Soho has taken this one step further with the launch of its new service Childsafe - the only network-level internet security system on the market today that requires no technical or installation knowledge. Unlike systems from other providers, Childsafe subscribers can choose exactly what services or content are allowed, safe in the knowledge that everyone in the home will be protected from websites, chat-rooms or other unwanted internet services. Furthermore, it is the only service that also offers comprehensive protection against viruses, worms, phishing attacks or spyware. Prior to the launch of Childsafe, Claranet Soho commissioned its own market research into the concerns of parents about internet security in the home and the solutions they were looking for. Censuswide conducted the research in June 2012, with a sample size of 1,000 parents with children under the age of 16, the results of which follow.

4 4 Research findings 1 - Do you think Internet Service Providers (ISPs) should provide better support for internet safety and initiatives? 10.1% 89.9% YES NO ISPs act as a gateway between consumers and the internet and it is clear that parents believe that providers should share responsibility for protecting under-age consumers from accessing inappropriate content. While parents should be responsible for monitoring their children s internet safety, in practice this is not consistently happening. Parents often find device filters difficult to install and maintain, and lack internet safety education or up-to-date information. 2 - Do you have any internet controls at home to protect your child when they are online? 10.1% 20.3% 26.3% 53.4% 89.9% YES NO CHILDREN DO NOT GO ONLINE Many parents report feeling left behind in the world of technology and that they often lack the knowledge or skills to educate their children about internet safety. There are opportunities available to improve knowledge but this tends to be fragmented and ineffective.

5 5 3 - When your child is online, what are your biggest concerns? 6% 76.6% 65.9% 60.8% 47.4% Viewing explicit content (pornography or violence) Meetings strangers Giving out personal details (personal address) Cyber bullying Not concerned Our findings mirror the concerns of the Independent Inquiry, which concluded that easy access to online pornography is having a negative impact on attitudes to sex, relationships and body image. Other concerns raised by the Independent Parliamentary Inquiry include the rise of cyber bullying, extreme violence, self-harm, suicide and pro-anorexia websites. Lack of control can also open-up the home computer to phishing attacks and the potential issue of piracy, be that film, music or software. 4 - Do you think the government should have legal powers to intervene should the ISPs fail to implement an appropriate solution? 15.7% 84.3% YES NO Our findings are emphatic. The overwhelming majority of parents believe that the government should seek backstop legal provisions to intervene should the industry as a whole fail to self-regulate.

6 6 Childsafe Childsafe is one of the easiest and safest ways to keep your family protected online. It is a network-level internet security system that requires no installation or technical knowledge. Childsafe subscribers can choose exactly what services and content are allowed, safe in the knowledge that everyone in the home will be protected from any undesirable websites, chat rooms or other unwanted internet services. Protection is also provided against viruses, worms, phishing attacks and spyware. A significant advantage of Childsafe is that it allows parents who are less technically skilled to have confidence that their home internet connection is protected. This is done through channels created by a Claranet Guardian chosen by the subscriber, who recommends the approved content. This means that a single, non-technical decision is all that is required to have a safe home internet. Features: No installation or technical knowledge required. Subscribers can choose an organisation they trust to provide a safe, appropriate channel. Sites can be blocked or unblocked in a simple, secure manner. Automatic protection against viruses, malware, phishing and worms. Protect internet chat, video calls, file-sharing and social networking ; not just basic websites. Protects PCs, laptops and WiFi-enabled mobile devices which are connecting to the protected internet service. Over 140 categories are available for those requiring even more control. Over 450 million categorised URLs, covering 6 billion web pages in 200 languages, are checked. An ongoing review of the URL list ensures new blocked sites are added and that the list is kept up-to-date.

DNS. Ofcom Report on Internet safety measures Internet Service Providers: Network level filtering measures

DNS. Ofcom Report on Internet safety measures Internet Service Providers: Network level filtering measures DNS Ofcom Report on Internet safety measures Internet Service Providers: Network level filtering measures Publication date: 22 July 2014 About this document This report sets out the measures put in place

More information

The Government s response to the consultation on parental internet controls

The Government s response to the consultation on parental internet controls The Government s response to the consultation on parental internet controls December 2012 1 Contents Introduction 3 Summary 6 How the consultation was conducted 6 Summary of responses by respondent type

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Independent Parliamentary Inquiry into Online Child Protection

Independent Parliamentary Inquiry into Online Child Protection Independent Parliamentary Inquiry into Online Child Protection Findings and Recommendations April 2012 Contents Page Report Background to the Inquiry 3 Summary of Findings 5 Recommendations 8 Structure

More information

Ofcom response to the Lords Science and Technology Committee report on Personal Internet Security

Ofcom response to the Lords Science and Technology Committee report on Personal Internet Security Ofcom response to the Lords Science and Technology Committee report on Personal Internet Security 1 Ofcom welcomes the opportunity to respond to the recommendations of the Lords Science and Technology

More information

Ofcom Report on Internet safety measures Strategies of parental protection for children online

Ofcom Report on Internet safety measures Strategies of parental protection for children online Ofcom Report on Internet safety measures Strategies of parental protection for children online Publication date: 12 January 2015 About this document This Internet safety measures report looks at parental

More information

YOUNG PEOPLE, MUSIC & THE INTERNET

YOUNG PEOPLE, MUSIC & THE INTERNET YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

More information

Parent-led Protection

Parent-led Protection RESEARCH PAPER ADAM SMITH INSTITUTE Parent-led Protection Market-based solutions to child safety By Dominique Lazanski Introduction Claire Perry MP recently chaired an independent review into whether Internet

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within

More information

REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION RESPONSE FROM NETSWEEPER INC.

REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION RESPONSE FROM NETSWEEPER INC. REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION RESPONSE FROM NETSWEEPER INC 16 May 2014 Netsweeper Inc. 104 Dawson Road Suite 100 Guelph, Ontario, N1H 1A7

More information

CyberSafeSchool delivers complete cyber protection inside and outside a school s gates.

CyberSafeSchool delivers complete cyber protection inside and outside a school s gates. CyberSafeSchool provides schools with the most technologically advanced tools to protect students online. The solution helps prevent cyber bullying, identifies predators, blocks inappropriate content and

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

5 Simple Ways To Avoid Getting An Avalanche of Spam

5 Simple Ways To Avoid Getting An Avalanche of Spam 5 Simple Ways To Avoid Getting An Avalanche of Spam As you probably already know from firsthand experience, once you re on a spammer s list, it s next to impossible to get off. And changing your e-mail

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

5 SIMPLE WAYS TO AVOID GETTING AN AVALANCHE OF SPAM

5 SIMPLE WAYS TO AVOID GETTING AN AVALANCHE OF SPAM 5 SIMPLE WAYS TO AVOID GETTING AN AVALANCHE OF SPAM By, Ryan Williams Chief Technology Officer Nexxtep Technology Services, Inc. 2010 Nexxtep Technology Services, Inc. INTRODUCTION As you probably already

More information

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM

A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM A SIMPLIFIED EXPLANATION OF CANADA S NEW LAW ON SPAM IED WEB MARKETING DEVRY SMITH FRANK LLP CANADA S NEW LAW ON SPAM Businesses and governments have been making significant strides in their never-ending

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses

More information

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

The 2009 Parliament and Internet Conference Thursday 16 th October

The 2009 Parliament and Internet Conference Thursday 16 th October The 2009 Parliament and Internet Conference Thursday 16 th October The fourth Parliament and Internet Conference was held in Portcullis House on Thursday 16 th October 2009 and proved to be the biggest

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Phone Apps for Online Safety Apple and Android

Phone Apps for Online Safety Apple and Android Phone Apps for Online Safety Apple and Android Safe Eyes Mobile (Mobile App) Control your child's Internet usage while she's on the iphone by blocking questionable sites. This app has YouTube filtering

More information

2011 Parent-Teen Internet Safety Report

2011 Parent-Teen Internet Safety Report 2011 Parent-Teen Internet Safety Report GFI Software June 2011 TABLE OF CONTENTS INTRODUCTION STUDY METHODOLOGY KEY FINDINGS AT A GLANCE CONTENT COMMUNICATIONS MALWARE INTERNET SAFETY EDUCATION ANALYSIS

More information

ef*f Children and Parents: Media Use and Attitudes Report

ef*f Children and Parents: Media Use and Attitudes Report ef*f Children and Parents: Media Use and Attitudes Report Research Document Publication date: October About this document This report examines children s media literacy. It provides detailed evidence on

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Policy E-040 Effective Learning Environment GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut Procedure E-040.4 - Acceptable Use and Internet Safety Agreement Acceptable Technology Use Regulations/Internet

More information

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Daniel V. Hoffman, CISSP, CEH, CHFI Chief Technology Officer Page 1 Global Threat Center Exploit Research and Development

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

Subject: Circular Number: 2011/22 INTERNET SAFETY. Date of Issue: 27 September 2011. Governor Awareness: Essential.

Subject: Circular Number: 2011/22 INTERNET SAFETY. Date of Issue: 27 September 2011. Governor Awareness: Essential. Subject: INTERNET SAFETY Target Audience: Principals and Boards of Governors of all grant-aided schools; Education and Library Boards; Council for Catholic Maintained Schools; Council for the Curriculum,

More information

5 Simple Ways To Avoid Getting An Avalanche of Spam

5 Simple Ways To Avoid Getting An Avalanche of Spam Customer Education Series 5 Simple Ways To Avoid Getting An Avalanche of Spam A Business Owners Guide To Eliminating The 10-15 Most Unproductive Minutes Of Each Employee s Day 5 Easy Ways to Avoid Getting

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Children and the Internet

Children and the Internet Children and the Internet The Internet is an increasing part of today s culture, especially for children and youth, for whom schoolwork, online gaming, and social networking are among the most popular

More information

RM Internet Filtering Policy

RM Internet Filtering Policy RM Internet Filtering Policy Introduction RM connects more schools to the Internet than any other provider in the UK. A key reason for the popularity of the service is the attention paid to filtering.

More information

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme avecto.com Contents Introduction to the scheme 2 Boundary firewalls and internet gateways 3 Secure configuration

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits. SecureIT Plus PC Security To learn more about Security Coverage s suite of security features, select from the Quick Links that follow. This document can also be printed, or saved to your desktop and used

More information

BPI response to the Draft Ofcom Annual Plan 2013-14

BPI response to the Draft Ofcom Annual Plan 2013-14 BPI response to the Draft Ofcom Annual Plan 2013-14 Introduction 1. BPI welcomes the opportunity to comment on the planned work of Ofcom in the year 2013-14. BPI will contain its comments to those aspects

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

How will pupils gain access to the Internet and VLEs at Saintfield High School?

How will pupils gain access to the Internet and VLEs at Saintfield High School? SAINTFIELD HIGH SCHOOL POLICY FOR THE ACCEPTABLE USE OF THE INTERNET AND VIRTUAL LEARNING ENVIRONMENTS What is the Internet? The Internet is an electronic information highway connecting many thousands

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

of firms with remote users say Web-borne attacks impacted company financials.

of firms with remote users say Web-borne attacks impacted company financials. Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this

More information

This document sets out a voluntary industry code of practice on traffic management transparency for broadband services.

This document sets out a voluntary industry code of practice on traffic management transparency for broadband services. Voluntary industry code of practice on traffic management transparency for broadband services March 2011 Overview This document sets out a voluntary industry code of practice on traffic management transparency

More information

C H E R O K E E C H R I S TIAN SCHOOLS ( M I D D L E S C H O O L AND HIGH SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

C H E R O K E E C H R I S TIAN SCHOOLS ( M I D D L E S C H O O L AND HIGH SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY C H E R O K E E C H R I S TIAN SCHOOLS ( M I D D L E S C H O O L AND HIGH SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

National report for Bulgaria

National report for Bulgaria National report for Bulgaria By Jivka Marinova Contribution to the European report: Uwe Hasebrink, Sonia Livingstone and Haddon, L. (eds) Comparing Children's Online Opportunities and Risks across Europe:

More information

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

The enemy within: Stop students from bypassing your defenses

The enemy within: Stop students from bypassing your defenses The enemy within: Stop students from bypassing your defenses Computer literate K-12 students regularly use anonymizing proxies to bypass their school s web filters to access pornography, social networking,

More information

NET CETERA Chatting with Kids About Being Online

NET CETERA Chatting with Kids About Being Online NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate

More information

Acceptable Use of ICT Policy. Learner School Policy

Acceptable Use of ICT Policy. Learner School Policy Acceptable Use of ICT Policy Learner School Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 3 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 4 5. MONITORING 5 6. SOCIAL NETWORKING 5 7. LEGAL

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Whitepaper Cyberoam The Role of IT in Education VCW SECURITY. The Role of IT in Education

Whitepaper Cyberoam The Role of IT in Education VCW SECURITY. The Role of IT in Education VCW SECURITY Whitepaper Cyberoam The Role of IT in Education The Role of IT in Education Information Technology (IT) today is not just a subject that is taught to the younger generation, it has become

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

LCC xdsl Usage Policy

LCC xdsl Usage Policy LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These

More information

Name of Filtering Software

Name of Filtering Software List of Filtering Software 1 Copyright Name of Filtering Software page ContentProtect. 2 CYBERsitter.. 4 Net Nanny.. 6 Cyber Patrol.. 7 ContentBarrier.. 9 KidsGoGoGo... 10 CYTANET s Safe Internet. 11 List

More information

How To Ensure Your School Is Safe Online

How To Ensure Your School Is Safe Online Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET

INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET INFORMATION COMMUNICTIONS TECHNOLOGY (ICT), E-MAIL AND THE INTERNET ACCEPTABLE USE POLICY As part of the College IT programme we offer pupils filtered access to the Internet. Before being allowed to use

More information

Third implementation review of the European Framework for Safer Mobile Use by Younger Teenagers and Children. June 2010

Third implementation review of the European Framework for Safer Mobile Use by Younger Teenagers and Children. June 2010 Third implementation review of the European Framework for Safer Mobile Use by Younger Teenagers and Children June 2010 About the Framework As growing numbers of mobile operators offer their customers access

More information

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY Cherokee Christian Schools (the School ) provides Information Technology (IT)

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Take a tour of the technology that can help you understand what your children are seeing online.

Take a tour of the technology that can help you understand what your children are seeing online. Helping Keep Children Safe Online INSIDE Take a tour of the technology that can help you understand what your children are seeing online. 3 tips for keeping your children safe online from the UK Safer

More information

Filtering Child Pornography on the Internet

Filtering Child Pornography on the Internet Filtering Child Pornography on the Internet An Investigation of National and International Techniques and Regulations Summary W.Ph. Stol H.W.K. Kaspersen J. Kerstens E.R. Leukfeldt A.R. Lodder 26 May 2008

More information

How To Protect Your Organisation From Viruses At The Gateway Of Your Network And Internet At The Same Time

How To Protect Your Organisation From Viruses At The Gateway Of Your Network And Internet At The Same Time EQUIINET WHITE PAPER Virus Scanning at the Internet Gateway The Internet has made information available to more people more quickly than ever before. While overwhelmingly positive in general, the downside

More information

Cyber Safety Use Agreement - ICT at School

Cyber Safety Use Agreement - ICT at School Cyber Safety Use Agreement Year 4 to Year 7 students Dear Parents and Caregivers, To assist us to enhance learning through the safe use of information and communication technologies (ICTs), we are now

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012

More information

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening. Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people

More information

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com

USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com USER MANUAL OPTENET WEB FILTER PC Version 9.8 www.optenetpc.com 06-06-2008 1 2 CONTENTS 1. INTRODUCTION... 6 2. INSTALLATION STEPS... 7 3. SET-UP... 10 3.1. Filter status: Activating/ Deactivating...10

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

MEASURES FOR MOBILE TELECOMMUNICATIONS NETWORKS

MEASURES FOR MOBILE TELECOMMUNICATIONS NETWORKS 10/11/2014 PARENTAL CONTROL MEASURES FOR MOBILE TELECOMMUNICATIONS NETWORKS Policy, Competition & Economic Analysis Department TABLE OF CONTENTS TABLE OF CONTENTS..1 1.0 EXECUTIVE SUMMARY 2 1.1 INTRODUCTION

More information

The Impact of Anonymous Proxies In Education

The Impact of Anonymous Proxies In Education The Impact of Anonymous Proxies In Education 2014 Survey Results Proxies can be used to access pornographic or file sharing sites. during Once a student successfully finds a proxy site, everyone knows

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information