Feeds

Home Office issues net child protection guidelines

ISPs take note

5 things you didn’t know about cloud backup

The Home Office yesterday announced new guidelines for ISPs to help protect kids from the dark side of the internet. The main points suggest that providers should:

  • Offer users a way of reporting material that is illegal or potentially harmful to children
  • Offer content filtering on search engines
  • Manually review and approve websites included in search services aimed at children
  • Consider whether they need human or automatic moderation for chatrooms
  • Ensure where necessary staff who come into contact with children have had relevant Criminal Records Bureau checks

Home Office minister Paul Goggins - who is chair of the government's Taskforce on Child Protection on the Internet - proclaimed: "Countries across the EU and around the world are committed to making the internet safe for children and cracking down on paedophiles' use of the internet. I want to make sure that by working across international boundaries and involving the internet industry, we keep children safe from abuse in the UK and the rest of the world.

"These guides will ensure safer online standards for our children. The internet is a great tool for children with massive benefits for our society, but we know that paedophiles will target children in any setting they can. Our message to them is clear - there is no place for online abuse anywhere in the world, and our police are one step ahead in the fight to protect children."

Goggins used the launch of the guidelines to announce the appointment of National Crime Squad Deputy Director Jim Gamble as Chief Executive of the UK's new Child Exploitation and Online Protection Centre, which will be operational from April 2006.

The London-based centre, with around 100 staff will provide "a single point of contact for the public, law enforcers, and the communications industry to report targeting of children online". It will also be available 24/7 to offer advice to parents and kids, as well working with the police on "proactive investigations".

The full ISP guidelines should be available shortly right here at the dedicated Home Office child protection page. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.