This guide highlights a practical approach for online safety for schools. It defines each of the areas you need to think about, offers an overview of what schools are currently doing regarding online safety (based on recent research) and offers a set of reflective questions for schools to ask themselves when developing their approach.
Tagged with advice
If you are a woman, the person most likely to kill you is your boyfriend, your partner, your husband.
With the support of local councils and fostering agencies, it is important that foster carers feel confident in dealing with the risks children face both offline and online.
Rules and boundaries you set offline can apply online. Take time to learn about the risks all children and young people face online, including access to inappropriate content and contact from people they don't know, so you can support the children in your care.
Fears than being hooked on social media is creating a generation of depressed and anxious teenagers have been overstated, according to a study which found it has a "trivial" effect on life satisfaction.
Ministers and parent groups have raised the alarm about excessive time spent on sites like Facebook, Instagram and Twitter.
But University of Oxford researchers found little evidence to support it making heavy users less content.
Sextortion is a type of online blackmail where people are tricked into performing sexual acts on webcam and then blackmailed to pay a sum of money in order to avoid images or videos being shared with friends and family on their social media contact lists. There are a wide range of motives behind this type of financial crime.
There has been many incidents in recent years similar to this.
Over the weekend, news outlets reported that a New Zealand man named Andrew Barker had found a camera, hidden in a smoke detector, in his Airbnb that was livestreaming a feed of the living room. Barker was in Cork, Ireland, on a 14-month trip around Europe with his family when they checked into the rental house. Once they unpacked, Barker, who works in IT security, conducted a scan of the Wi-Fi network and found a camera the owner had not mentioned. He was then able to connect to the camera and view the live feed.