E-Safety: Conduct

Students' behaviour in a virtual environment may sometimes be different to that in real life. The common belief is that the virtual life acted on the Internet is a place where social rules need not apply and people can act differently. Some students consider their attitude to be 'normal', 'what teenagers do', 'acceptable' as others act in the same manner. Do the students consider the impact of their actions? For example downloading illegal films which have not been released to general sale.  The money lost can have significant impact in terms of jobs and prosperity for the companies that make films. 







(Child as actor)

Illegal downloading,
Financial scams,

Bullying or Harassing another Creating and uploading inappropriate material Providing misleading info/ advice


Illegal downloading

Illegal downloading is an issue that plagues many industries. It may seem a popular and common thing to do but downloading games, music, applications illegally can cost millions of pounds of lost revenue. Internet Service Providers (Virgin, BT, Sky, TalkTalk, PlusNet and others) have made an agreement with representatives from the Motion Film and Music industries to provide warning letters to the households who download illegal products. This agreement due to the Digital Economy Act in 2010, says that persistent downloading of illegal music, film or games could result in reduction in internet connection speed or full disconnection by the service provider if there is no change in attitude.

In the spring of 2015, a major multi-media education awareness campaign about the value of copyright and licensed entertainment was rolled out with funding being provided by government.



Instances of hacking are now a regular occurrence. Not a week goes by without a known Hackers Group making an attempt to access secretive/sensitive data held by large organisations using vulnerabilities in their computer systems. The most common reason for a successful hack is due to a weakness in the usernames and passwords used at the targeted organisation. At St Peter's we enforce complex passwords, requiring a minimum of characters, numbers, capital and lower case letters for all users, whether students or staff.

Accessing other people’s accounts without their permission is against the law. We stress the importance of not sharing passwords with friends, as friendships for children are likely to change throughout their time at St Peter's. Hacking is often seen as requiring an advance understanding of computing but this is not the case. It does not require a great deal of knowledge, though any action performed by a hacker always leaves traces, like virtual footprints. If a person is found to be hacking they will be pursued by the police and sometimes by foreign police/security forces, depending which organisation has been hacked into.
In the United Kingdom it is possible to break the law by either accessing another person’s computer without their permission, altering information which is found on an illegally accessed computer or installing/ deleting applications or files. The Computer Misuse act 1990 enables judges to pass sentences varying from a maximum fine of £5000 to a 12 month custodial sentence.

There are different ways to prevent yourself becoming a victim of hackers. Firstly, have an up to date anti-virus system; some hackers like to run viruses and other nasty pieces of software which can play havoc with your computer system. There are many different anti-virus software packages available to buy online or in a high street store. The prices of these can vary significantly and can cover multiple machines. There are also a number that are free such as AVG and AVAST. Remember an anti-virus that is not kept up to date (minimum weekly) is equivalent to not having one.

Another way to keep your computer protected is to have a firewall running whilst you are connected to the Internet. A firewall looks at all the data that comes through the internet onto your computer. If something comes along which might not be expected then the firewall will isolate the piece of data and ask you what you want to do with it. Microsoft provide a basic firewall as part of their operating system Link. Having a firewall may sometimes cause you some annoyance, as it may constantly pick up some data traffic which you need and ask you what action to take. You can tailor the firewall to ignore specific data from an application by adding an exception. 


It is a frightening fact that 2% of children between the ages of 11 – 14 have a gambling problem. Even more worrying is that there is little in terms of government funded support for children who have this addiction. Young children are experiencing gambling at a young age. The types of places where young children experience gambling is more often than not in a family environment such as an entertainment and/or a leisure space, for example amusement arcades, fast food outlets, cafes, and public houses.

GamCare continues to develop education and prevention strategies for young people to increase awareness and educate about the risks of gambling. GamCare have produced a website ‘Big deal’ aimed at teenagers to provide information, quizzes and videos about gambling and the dangers that come with it.

If you or your child feel that they need to talk to someone about Gambling GamCare provides an online chat service called Netline as well as a Chatroom. All discussion whilst using Netline is confidential.

GamCare have produce a self-assessment toolkit to see whether an adult has a gambling problem.

Financial Scams

Online financial scams can take many different guises from online dating to work from home scams.  No matter the type of scam, they all involve the scammers encouraging you to give them your hard earned money.  The Action Fraud website set up by the UK Police is a site which not only identifies different types of scams but also provides advice/support to victims and also provides you with means to ensure that you are protected. It is important to inform the police if you have been a victim but please use the Action Fraud number which can be found on the logo below


One Financial scam which could cause some initial concern is when fraudulent email from your online bank (NatWest, HSBC, Lloyds, Barclays etc.) arrives in your email inbox, informing you of some difficulty which their website is currently facing.  The email goes on to encourage the recipient of the email to reactivate your account within a certain time by following a link to a bogus website (made to look like your bank website) and provide your banking details. It is essential that you do not provide any information. If you were to enter your details, you will find that your bank account will have been emptied very quickly. This illegal trick is called ‘Phishing’. An example of an email can be found below.

 What should I do to protect myself from Phishing?

 NatWest Bank provide a very useful guide to ensuring that you do not fall victim to Phishing

  • Check the email address - Is it the same as the email address you usually receive emails from, or just similar.

 Check the email subject line - anything along the lines of "There is a secure message waiting for you", "Security Alert", "System Upgrade" and so on should be treated as suspect.

  • Check the message title - if it reads 'Dear Customer' or 'Dear Valued Customer' or if isn't personalised at all, then you should be suspicious. Phishing emails will not usually include your name.
  •  Be wary if the email asks you to click on a hyperlink or a button to download a file. Wording such as 'verify your account or password' or 'update your security details' should be viewed as suspicious – they are likely to take you to a copycat website where you may be prompted to enter personal details which can be used to commit fraud.
  •  Be suspicious of any message that creates a sense of urgency, such as 'If you don't respond within 48 hours, your account will be suspended'.
  • A legitimate company will not create a false sense of urgency.
  •  Check the grammar and spelling for mistakes or inconsistencies.

 Barclays provide the following guidance to their customers

  • Ignore emails claiming to be from Barclays that ask for your Online Banking details. They often ask you to follow a link to a site and enter your security/log-in details.
  • Barclays does not send emails asking you for your security or other personal information.

Always make sure that you see your personalised image when you receive an e-mail from us; any message we send to you includes your anti-phishing image. Your personalised image is known only by us, so you can be sure that any message containing your image is legitimate. If you ever receive an e-mail without your image, do not open any attachments or click any links in the e-mail.


 The Internet can be a fantastic medium to communicate. It has been used by many families to keep in contact with love-ones or family members abroad, bringing people closer together. It is also a way to share information: individuals can have their own video channels, which can be used for a wide range of purposes such as reviewing the latest technology to come to TVs or to share views or beliefs.  Terrorists have started to use the internet to share videos, plan attacks or build up hate. The recent ISI videos which have been commended worldwide had been published on the internet to generate a media frenzy. After the brutal murder of Rigby, it has been reported that one of the killers had communicated his desire to carry out “in the most graphic terms” an Islamist jihadi attack on social media. There is currently a great deal of debate on how to restrict potential/actual terrorist from communicating on the internet. The following articles will provide a greater insight on how the government are planning to deal with Terrorists using the Internet.

Telegraph - Police to 'patrol' Facebook and Twitter for terrorists under EU plan

The BBC - Downing Street presses ISPs over 'jihad reporting' button

The Daily Mail - Cyber border controls to stop extremist videos hosted abroad being accessed in the UK to prevent young Brits being radicalised


Bullying/Harassing others


Cyberbullying is when a person or a group of people uses the internet, mobile phones, online games or any other kind of digital technology to threaten, tease, upset or humiliate someone else. This can be done in a number of ways, using writen language, photographs, videos or voice recordings. 

Cyberbullying happens for many of the same reasons as any other type of bullying, but it may be even more appealing because it can be done anonymously. Stopbullying.gov describes two kinds of people who are likely to bully: those who are popular and those who are on the social fringes.

Popular children may bully because:

  • They see it as a way to stay popular.
  • Hurting others makes them feel powerful.

Children who are less socially successful may bully because:

  • It helps them cope with their own low self-esteem.
  • They think it will help them fit in with their peers.
  • They have trouble empathizing with those they hurt.

Here are some additional reasons people may do their bullying online:

  •  Anonymity—Cyberbullying allows bullies to avoid facing their victims, so it requires less courage and provides the illusion that bullies won’t get caught.
  • Ignorance of the consequences—The National Council on Crime Prevention reports that in a survey of teenagers, 81% said they believe others cyberbully because they think it’s funny. Because they don’t see their victims’ reactions in person, cyberbullies may not realize how much damage they are doing.
  • Social pressure—Some cyberbullies may think their behavior is normal and socially acceptable, especially when friends egg them on.


Creating and Uploading Inappropriate content





'Revenge Porn'

People who distribute explicit photographs of an ex-partner without their consent can be prosecuted under existing laws.

Many cases can be dealt with under existing legislation, including the Malicious Communications Act 1988, the Communications Act 2003 and, in the worst cases, the Sexual Offences Act 2003. Cases involving minors can be dealt with under the Protection of Children Act 1978.

News article:  Revenge pornography 'can and will' be prosecuted, vow CPS lawyers

Providing misleading information/ advice