Cyber Toolkit: Create (NEW)

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using devices and online platforms to create content. This can be any form of media, including video, photos, text or games. Creating content carries less risk than consuming or communicating as long as the content remains on the device – the biggest risks coming when created content is shared via communication.

Ofcom data (2022) shows that the number of children and young people creating online video content is actually a small number and decreasing as this content becomes ‘more professionalised’.

Cyber Toolkit home

Go to Consume or Communicate

cyber toolkit create

Internet safety risks and considerations

Access

In order to create online content and potentially inappropriate or harmful content, learners usually need access to:

  • a device (internet access is not necessarily required for creating media content)
  • apps to create the content, such as the device’s camera and editing or manipulation apps

When supporting learners with this area, it is important to consider who controls their access to these opportunities and resources:

  • Is there a risk of this occurring in school?
  • How is that enabled?
  • Are there steps that could be taken to reduce the risk of this?

If it is an out-of-school risk:

  • How can the school support with this?
  • Is support required for families or learners?
  • Who can support with this: Community Learning and Development or Police Scotland?
Potential risks

Being more cyber resilient reduces the risk of internet safety issues arising. We all want the internet to be a more welcoming space for children and young people and that is why we promote this positive message of safe, smart and kind.

Topics to explore with learners might include are:

  • the types of content they might create
  • the risk in creating or sharing?
  • the risk of creating and sharing content to them or might it harm others?
  • the potential risks, and associated harms, the same for everyone – why are they different, and why does this matter?

Cyber resilience guidance

Devices

The first potential vulnerability when creating content is the device not being securely setup.

Check with learners that they have taken these steps to reduce the risk of content being stolen from their device:

  • their device account (Windows, iOS or android) has a strong password (three random words)
  • makes use of 2-factor authentication (2FA)
  • additional security features, such as fingerprints or facial recognition
  • has a unique account for each user (if shared device, such as a tablet or laptop)
  • a screenlock that requires a passcode or biometric (face or fingerprint) to log in to stop unauthorised access (hacking)
  • the latest operating system (usually iOS, android or Windows) installed as this usually fixes potential security vulnerabilities
  • installed apps from approved providers, such as App Store or Play Store to avoid potentially malicious apps that allow content to be stolen through a ‘backdoor’

 

Learners should also consider where created content is stored – this will typically be on the device but can also be stored on cloud storage, such as OneDrive, iCloud or Drive, and this adds the risk of remote hacking and content theft

 

  • apple devices have a content filter, called communication safety in Messages, in their ‘screen time’ settings that blocks potentially nude content sent or received on children’s phones
Accounts

Another potential vulnerability when creating content is the accounts on the device or online platform not being secure enough and allowing others to access created content.

Check with learners that they have taken these steps on their apps to reduce the risk of content being stolen from their accounts:

  • they use a secure, perhaps separate, email account (with its own unique username, secure password and 2FA)
  • they use their device security, such as account and biometrics, to log in to apps as this means they need to have the device in-hand to access the account
  • they do not share access to their account with anyone
  • they know how to use the settings and security features to set the platform up to only share information they are willing to share – this might include turning off data or location tracking, for example
Report and support

When using devices or online platforms to create content, learners should understand that online platforms and services, including apps, carry greater risk of being shared without permission as the content created on these is almost always stored on their server, which is the company’s computer, and not the child or young person’s device. 

Should created content ever be shared with, or without, permission then learners should have the knowledge, skills and support to report and recover from the potential risks associated with this:

Anyone under the age of 18 is considered a child by law and ANY content that contains exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

 

It is not illegal to film or photograph someone without consent, however, any exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

Digital content that may have been created consensually but once consent is revoked it can be challenging to stop the other party sharing it. The Internet Watch Foundation Report/Remove tool can be used to request any exploitative or indecent images and video are removed from online servers.

Resources

Thinkuknow by CEOP is the national website for learning about child exploitation and online protection (CEOP). Their learning resources site offers information and resoruces for learners, families and educators. 
These are a selection of the resources for different ages:

Jessie & Friends (4-7s)

Play Like Share (8-10)

Send me a pic? (11-14)

Exploited (14+)