Feeds

Govt offers Net advice to schools

More on the paedophile saga

  • alert
  • submit to reddit

Top three mobile application threats

The government, in the form of "learning and technology" minister Michael Wills, has joined forces with one-woman pressure group Carol Vorderman to provide schools with advice over how to approach the Internet.

The Superhighway Safety pack follows on the heels of recent controversy regarding the use of Internet chatrooms by paedophiles to "groom" young children. Several leading figures have applauded Ms Vorderman's publicising of an important issue but warned against hysterical over-reaction.

The government advises that schools pay special attention to school Web sites, pupil email addresses and chat rooms. It also offers advice on filtering software for their IT systems.

Pupils should be given an email address based on a class rather than an individual name when dealing with the outside world, the guidance suggests, since this allows a particular child to be targeted. Individual names are fine when dealing within a school system.

It also advises caution when posting pictures of children on school Web sites. The same point was made by Detective Chief Superintendent Keith Akerman - chairman of both the UK Internet Crime Forum and the Association of Chief Police Officer's computer crime working group - at a meeting in the Home Office yesterday.

Pupils, teachers and parents should also be warned and educated about the possible risks involved in external chatroom conversation. A report yesterday by the Internet Watch Foundation suggested the following points be made to children:

  • Do not give out personal details, photographs or other identifying information such as where you live or the school you go to
  • Do not take other people at face value
  • Never arrange to meet someone you've only known through the Internet without telling your parents, getting permission and taking an adult along with you. You should also meet in a public place.
  • Don't open or download an attachment unless you know and trust the person that sent it
  • Never respond to anything you find disturbing. Save it or print it, log off and tell an adult.

Michael Wills had this to say: "As the Internet continues to develop, we must remain constantly
vigilant in our efforts to protect children against those who would abuse it. The Internet and email are powerful tools to open up new opportunities for people of all ages. The Government wants everyone to have access to the wealth of cultural, scientific and intellectual material to be found on the Internet. But we are equally determined to ensure that pupils are protected from unsuitable material and that they can access appropriate material safely."

Aside from using the out-moded term Superhighway, the advice pack is a good step forward by government and can be seen online here. It has been compiled by the DfEE, NCH Action for Children, the Parents Information Network, the Internet Watch Foundation, ChildNet, Disney and the British Educational Suppliers Association.

Carol displayed her continuing paranoia regarding the Internet, telling reporters at the launch at a school in the East End of London: "I have got two children and I do not let the younger one use the Internet at all. But I will not let the older girl, who is eight, on the Internet without standing over her shoulder." ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.