Workbook 3 - Safeguarding
Workbook 3 - Safeguarding
Certificate in Understanding
Safeguarding and Prevent
ONLINE RISK
ILLEGAL ACTIVITY
TERROR-RELATED GROOMING
Workbook 3
Understanding Online Safety
How to use your learning materials
This course is delivered on a flexible learning basis. This means that most of your
study will take place away from your Assessor/Tutor. It helps to carefully plan your
studying so that you get the most out of your course. We have put together some
handy tips for you below.
Study Guidance
•• Try to plan an outline timetable of when and where you will study.
•• Try to complete your work in a quiet environment where you are unlikely to
be distracted.
•• Set realistic goals and deadlines for the various elements of your course.
•• Plan what you are going to study during each session, and try and achieve
this each time.
•• After each session, reflect on what you have achieved and plan what you hope to
complete next time.
•• Remember that not only do you have the support of your Assessor/Tutor, but it is
likely that your family, friends and work colleagues will also be willing to help.
Assessor/Tutor Support
Your Assessor/Tutor will be available to support and guide you through the
programme. They are experts in your area of study and are experienced in helping
many different types of learners.
They can help you to improve the standard of work you submit and will give
you useful feedback on areas in which you have excelled, as well as where
you can improve.
Remember to listen to, or read, their feedback carefully. Ask if you are unsure about
any of the feedback you receive as your Assessor/Tutor is there to help.
Make note of any tips they give. Refer to the learning materials as they contain the
information you need to complete the end-of-unit assessments.
Look out for areas in which you can improve, and set yourself an action plan to make
sure you complete the required work.
Take positive feedback on board; this demonstrates you are doing things right and
have a good understanding of the subject area.
Use the feedback to avoid repeating any mistakes you may have made.
2 © LCG 2018
CACHE Level 2 Certificate in Understanding
Safeguarding and Prevent
Workbook 3
Understanding Online Safety
Workbook Contents
In this workbook, you will learn about inappropriate and illegal online activity and the
potential consequences of terror-related grooming, downloading and sharing illegal
material. You will explore a range of online risks, including stalking and identity theft,
and will examine why acceptable use policies are created and how they are used.
Finally, you will examine behavioural changes that result from inappropriate and illegal
online activity and where to seek advice and support for online-related issues.
Contents
This workbook contains four sections: Page
Section 1: Understand the potential consequences of inappropriate
or illegal online activity 4
Section 2: Understand how to reduce the risks posed online 16
Section 3: Know about potential signs and behavioural changes that
could cause concern 29
Section 4: Extension activities 34
The assessments for this workbook can be found in: Understanding Online Safety
Learner contact details
Assessment 3
Name:
Contact address:
Email:
Learner declaration
When you have completed this workbook, you should I confirm that the answers in Assessment 3 were completed by me, represent my own
ideas and are my own work.
Learner signature: Assessment date:
attempt the assessment. Your Assessor/Tutor will then give If you need any help in completing these Assessments, refer to the
relevant section within Workbook 3, or contact your Assessor/Tutor.
you detailed written feedback on your progress. Please tick one of the boxes below to show what your status will be when you complete this course.
EMP 1 In paid employment for 16 hours or more
per week
GAP 1 Gap year before
starting HE
EMP 2 In paid employment for less than 16 hours EDU 1 Traineeship
per week EDU 2 Apprenticeship
EMP 4 Self-employed for 16 hours or more per week EDU 3 Supported Internship
EMP 5 Self-employed for less than 16 hours per week EDU 4 Other FE* (Full-time)
NPE 1 Not in paid employment, looking for work and
EDU 5 Other FE* (Part-time)
available to start work
NPE 2 Not in paid employment, not looking for work EDU 6 HE
and/or not available to start work (including retired) OTH # (please state)
VOL 1 Voluntary work ………………………………
Assessment 3 1
Upon successful completion of this qualification, learners will be awarded the NCFE
CACHE Level 2 Certificate in Understanding Safeguarding and Prevent: 603/2818/6.
This CACHE branded qualification is certificated by the Awarding Organisation NCFE.
Workbook 3 3
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
In this section, you will explore the consequences associated with the way individuals
behave online, the people they contact online and the content they post or interact
with online.
At a time when most of us use the Internet on a daily basis, it has become essential
that we understand the consequences of the way we behave, the people we interact
with and the type of content we post online.
Online conduct
Online conduct refers to the way an individual behaves while online. Read the
information below to learn more about the potential consequences of different types
of online conduct.
Hacking
The Computer Misuse Act 1990 makes it illegal to gain:
•• unauthorised access to computer material
•• unauthorised access with intent to commit or facilitate commission of further
offences
•• unauthorised acts with intent to impair, or with recklessness as to impairing,
operation of computer, etc.
Two amendments have been made to the Act:
Police and Justice Act 2006
Serious Crime Act 2015, which added:
•• unauthorised acts causing, or creating risk of, serious damage
•• making, supplying or obtaining articles for use in an offence
4 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Gambling
Online gambling is the largest gambling sector in the UK. According to statistics from
the Gambling Commission, online gambling accounts for 33% of all gambling in
Britain, yielding the industry £4.5 billion between April 2015 and March 2016.
In a separate report, the Gambling Commission found that 2 million people in the UK
are either addicted to gambling or at risk of developing a problem.
The consequences of gambling can be catastrophic and include:
•• losing vast sums of money
•• becoming addicted
•• bankruptcy
•• losing possessions, family and friends
•• losing employment
Workbook 3 5
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
The legal consequences of terror-related grooming and online terrorist offences are
enshrined in the Terrorism Act 2006. Following the 7 July bomb attacks in London,
the Terrorism Act 2006 was created as a means of disrupting the training and
recruitment of potential terrorists. The aim of the Act is “to make provision for and
about offences relating to conduct carried out, or capable of being carried out, for
purposes connected with terrorism.”
Under the Terrorism Act 2006, the following rules apply to online activity:
•• it is a criminal offence to encourage terrorism by directly or indirectly inciting or
encouraging others to commit acts of terrorism. This includes “glorification” of terror
by people who “praise or celebrate” terrorism in a manner that encourages others to
commit terrorist acts. If convicted of encouraging terrorism, the punishment is seven
years in prison
•• it is an offence to sell, loan, distribute or transmit terrorist publications, e.g. a
bomb-making manual
•• the Home Secretary can ban groups that glorify terrorism, including those who do so
online
The most common offences that are charged under the Terrorism Act are:
•• Section 5 – preparation of terrorist acts. Proof must be provided which shows that
an individual has engaged in the preparation of acts of terrorism or assisted others
in the preparation of acts of terrorism. The individual may have played a minor role
or planned murders, and the maximum sentence is life in prison.
•• Section 58 – collecting information. It is an offence to possess, collect or make a
record of information that could be useful to a person committing or preparing an
act of terrorism. The maximum sentence if convicted of this offence is 10 years in
prison.
•• Section 2 – dissemination of terrorist publications. Under this section, it is an
offence to distribute a terrorist publication with the intention of encouraging acts of
terrorism. The maximum sentence for this offence is seven years in prison.
Under Section 23A of this Act, individuals who have committed offences under
Schedule 18 are subject to special custodial sentences; they will not be entitled to
automatic release at the halfway point of their sentence and will only be released if
they are not believed to pose a risk to the public.
6 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Financial scams
Financial scams have been happening for hundreds of years, but the Internet has
provided a faster, more sophisticated way for criminals to cheat unsuspecting
individuals out of their hard-earned money. Examples include:
•• Fake websites – criminals have become adept at copying legitimate banking
websites to trick customers into providing their login information. Money is then
stolen from their account.
•• Fake emails – criminals also create legitimate-looking emails from banks and credit
card companies that tell customers their account has been hacked, and ask them
to provide security information so that their identity can be verified. In reality, the
customer’s bank account is fine, but if they give the information requested by the
criminals, they will lose their money.
•• Selling something online that doesn’t exist – this scam happens so often that there
is a Banking Protocol system, which alerts police to unusual activity. For example, in
2017, a retiree went to his bank to withdraw £10,000 to buy a Rolls-Royce from an
advert he’d seen online. He was going to travel across the country to meet the seller
and pass the money over, but bank staff thought the situation sounded unusual
and contacted police through the Banking Protocol system. Police investigated and
found that the car was registered to someone hundreds of miles away from the
supposed seller and that it was probable the buyer would have been robbed when
he arrived to buy the car.
•• Fake text messages – criminals send people a message via text or WhatsApp telling
them there has been suspicious activity on their account and they must reply with
their account number and PIN code.
Under the Fraud Act 2006, the maximum sentence is 10 years’ imprisonment. Fines
of between £20,000 and £100,000 are also possible.
Workbook 3 7
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
•• Communications Act 2003 – makes it a criminal offence to send via any electronic
communication network a message or other content deemed to be offensive,
indecent, obscene or menacing. Punishment is up to six months in prison and a
fine.
It is important to remember that all online activity is recorded by your Internet service
provider, which makes it traceable by the police.
8 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Online contact
Online contact refers to the different people, websites and content an individual
interacts with while online. Read the information below to learn more about the
potential consequences of different types of online contact.
Bullying/harrassment/stalking
As you learned earlier, the relative anonymity provided by the Internet empowers
some to bully and harass others. Bullying can result directly from contact with another
person online. For example, a person leaves negative feedback about a hairdressing
salon they visited. Suddenly, that person starts to receive distressing emails and
vicious comments on social media. The perpetrator even finds out where the victim
works and starts leaving negative feedback about the business, damaging that
business’s reputation. This is harassment and bullying.
Workbook 3 9
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Bullying and harassment can be prosecuted under the Protection from Harassment
Act 1997 (see page 7) and for victims, it can lead to depression, anxiety, self-harm
and withdrawal from social interactions.
Cyberstalking is where a person inundates another person with unwanted messages
or unwanted attention. It is illegal under the Protection of Freedoms Act 2012, and
became a crime in 2012. There is a National Stalking Helpline for victims: 0808 802
0300.
Grooming
You learned about terror-related grooming on page 5, and online grooming that is
not terror-related is exactly the same. Victims are identified because they are young
and/or vulnerable and the perpetrators use a mixture of flattery, threats and gifts
to encourage individuals to send indecent images of themselves or to meet up in
person, where they may be sexually or physically abused.
10 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Online content includes blog posts, social media posts, publications, photographs and
videos. Every time we go online, we are faced with a range of different content, from
adverts to spam emails containing suspicious links and sometimes sexual content.
Some people may need some guidance about the things they see online, while others
may need educating about the consequences of posting inappropriate content online.
Read the information in the following table to learn more about the potential
consequences of different types of online content.
Content Consequences
Adverts Almost every website we visit contains adverts, and as
search engines become more sophisticated, the adverts we
see are tailored to searches we have made and things that
are contained in our emails and on social media. The risk
here is that our interests and perceptions are being guided
and determined by online retailers and advertisers. Children
and vulnerable people are particularly at risk as they may
see adverts for products or services that are not appropriate
for them.
Violent/hateful The website Stormfront, which emerged in the early 1990s,
content was the first known Internet hate site, but Internet bulletin
boards were used as early as the mid-1980s to recruit hate
advocates. Since then, terrorists and others dedicated to
inciting hate have used the Internet to get their message
across and recruit others.
Workbook 3 11
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
In the following case studies, you will learn about the real world consequences of
using social media to incite a terror-related crime.
Case Study 1
On 15 March 2019, the city of Christchurch in New Zealand fell victim to its
first terrorist attack when white supremacist Brenton Tarrant shot and killed
51 people at two mosques.
Worshippers at the Al Noor Mosque and Linwood Islamic Centre were
attacked without warning. The terrorist responsible used social media to
sensationalise his hate and spread anti-Muslim sentiment by streaming live
video footage of the shootings on Facebook.
Tweets and a post on the anonymous message board 8chan, which often
features extremist and racist content, foreshadowed what would happen next.
The post on the 8chan message board led to an 84-page-long ‘manifesto’
which was filled with anti-immigrant and anti-Muslim ideas. The manifesto
also referred to white nationalist Anders Breivik, who committed the 2011
terror attacks in Norway. Within the manifesto was a link to the Facebook
page that live streamed the attack in Christchurch.
Facebook did take the video down, but not before it had been shared millions
of times, reaching viewers across the world.
Case Study 1 shows how social media can be used to spread terrorist content by
reaching millions of people instantly.
12 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Case Study 2
In 2017, married couple Ummariyat Mirza, 21, and Madihah Taheer, 22,
were jailed for 16 years and 10 years respectively for planning a terror attack
in Birmingham.
According to news reports, Mirza was arrested as a result of an intelligence
operation. He and his wife had been planning a knife attack potentially at a
synagogue in the city’s centre.
Mirza’s sister was sentenced to prison for 30 months for sharing propaganda.
She sent her brother five Islamic State videos via social media, which
amounts to disseminating terrorist publications.
Case Study 3
The far-right group National Action is a British racist neo-Nazi group that was
banned by the government in 2016 for being a terrorist organisation.
According to the BBC, the group is known to use social media to target young
people using ‘us-and-them’ messages designed to make young people angry.
Literature created by the group calls followers to adhere to Nazi ideology and
carry out violent action against ethnic minorities.
In 2016, members of National Action applauded Thomas Mair after he
murdered MP Jo Cox. It went on to call for more violence against the police
and other MPs. This “unlawful glorification of terrorism” lead the government
to add the group to its list of proscribed groups.
In January 2018, six people were arrested on suspicion of being members of
National Action. All six were held under Section 41 of the Terrorism Act on
suspicion of “being concerned in the commission, preparation and instigation
of acts of terrorism.”
Workbook 3 13
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
14 © LCG 2018
Section 1: Understand the potential consequences of
inappropriate or illegal online activity
Workbook 3 15
Section 2: Understand how to reduce the risks posed
online
In this section, you will learn about acceptable use policies, which most organisations
have in place to guide employees about what they can and cannot do when using the
IT system.
As the threats posed online increase, e-safety at home, in schools and at work has
become of paramount importance. It is essential that everyone who goes online
understands the potential risks posed by their own and others’ activity and what steps
can be taken to protect themselves.
An acceptable use policy (AUP) is a document that provides rules and guidelines for
using the Internet and an IT network, and practices that every user must agree to
before being granted access to a network. Most organisations, schools and colleges
will have AUPs that staff and students must sign and adhere to when accessing the
Internet.
Workplace
Workbook 3 17
Section 2: Understand how to reduce the risks posed
online
Home
Many of us have Internet access at home and, as users (and consumers), we will
frequently be subject to the AUPs of different companies. By using different sites and
services, you are acknowledging that you will adhere to each company’s AUP.
18 © LCG 2018
Section 2: Understand how to reduce the risks posed
online
The online risks posed to school-aged children have grown exponentially over the last
few years, and each school’s e-safety provision is key to educating children about
how to use the Internet safely. It is also a requirement of Ofsted that schools include
e-safety into the curriculum and that staff are up-to-date on how to keep themselves
and the children in their care safe online. Many schools create AUPs for learners and
staff.
Under Ofsted rules:
•• All teaching and non-teaching staff should be aware and able to recognise e-safety
issues with high quality leadership and management to make e-safety a priority.
•• Priority must be given to training and continuation training to all staff, including the
contribution of the wider school community.
•• Pupils should have an excellent understanding of how to stay safe online and the
dangers of inappropriate use of mobile technology and social networking sites.
•• There should be a progressive e-safety curriculum.
•• There should be good risk assessment.
•• There should be provision of a recognised Internet service provider with age-related
filtering.
(Source: www.theguardian.com/teacher-network/2012/sep/14/oftsed-esafety-
guidelines-september-2012)
Workbook 3 19
Section 2: Understand how to reduce the risks posed
online
Student AUP
20 © LCG 2018
Section 2: Understand how to reduce the risks posed
online
Teacher AUP
An AUP designed for teachers may include some or all of the following elements:
•• Monitoring policies.
•• A statement that the school’s IT network should primarily be used for educational
purposes.
•• A list of what staff must not do online, e.g.:
–– disclose their username or password to anyone else
–– use anyone else’s username or password to access the network
–– use inappropriate language
–– publish images of others without express permission to do so
–– use social networking sites unless use is part of the curriculum
–– communicate with students or parents on anything other than the school’s IT
system
–– use personal email addresses on the school’s IT system
–– open links or attachments from unknown sources
–– upload, download or access illegal materials, e.g. child sexual abuse images,
adult pornography or racist material
–– install or download software or a programme without permission.
Colleges/universities
All colleges and universities will have an AUP and it is the responsibility of staff
carrying out the induction of new learners to ensure that the requirements of a safe IT
user policy are communicated in an appropriate manner. By clicking the acceptance
page at the point of logging in, users are indicating their agreement to the guidelines
and constraints.
Workbook 3 21
Section 2: Understand how to reduce the risks posed
online
Scenario
The police alert university management that a computer connected to the
institution’s intranet has been used to send emails containing information
and links to videos intended to incite racial hatred. The links go to videos of
violence perpetrated by individuals in the name of white supremacy. Members
of the university’s IT department use the IP address and the time and date
stamp on the emails to find the student ID of the individual who created and
sent the emails from a library computer. The individual is located and an
investigation into their activity is conducted. The panel concludes that the
individual broke the university’s AUP policy and they are expelled from the
university.
22 © LCG 2018
Section 2: Understand how to reduce the risks posed
online
All AUPs are designed to protect an IT network from activities that are known to
increase online risks and to ameliorate incidental risks. AUPs provide a framework
and set of rules that everyone who uses a network must adhere to specifically to
reduce the risks posed online. As a result, it decreases the risk of users accidentally
or purposefully putting the network, the company, other workers and confidential data
at risk.
For example, an AUP places restrictions on the types of websites a user can visit,
and forbidden websites tend to be those that pose the greatest threat to a network’s
security. By preventing access, the risk from these sites is significantly reduced.
Additionally, most policies will include a stipulation that users cannot download new
software without permission, which reduces the opportunity for malware or spyware to
be uploaded onto an IT network.
Workbook 3 23
Section 2: Understand how to reduce the risks posed
online
Scenario
Sarah uses her work computer to anonymously send distressing and
harassing messages to a friend she has had an argument with. The police
track the IP address and contact the IT department at Sarah’s work. She
is called into her manager’s office and sacked with immediate effect for
breaking the terms of the AUP she signed.
In 2017, the term ‘fake news’ became part of everyday usage, and its proliferation
demonstrates why it is essential to always ask specific questions when interacting
with others online or when dealing with information online.
The essential questions to ask are ‘who?’, ‘what?’ and ‘when?’
24 © LCG 2018
Section 2: Understand how to reduce the risks posed
online
Asking ‘who, what and when?’ when interacting with others online
Who? Do you know the identity of the person you are interacting with?
Is there any way of validating that they are who they say they are?
As it is rare to meet people in person who you meet online and
because speaking on the phone has been replaced by messaging,
it can be very difficult to know if someone really is who they say
they are.
Workbook 3 25
Section 2: Understand how to reduce the risks posed
online
Asking ‘who, what and when?’ when interacting with information online
The Internet has provided easy access to vast amounts of information on almost every
subject. The difficulty is that anyone can upload information online, and figuring out
what is valuable and, importantly, accurate is getting more and more difficult. By
asking ‘who, what and when?’ you should be able to discern between good and bad
information.
26 © LCG 2018
Section 2: Understand how to reduce the risks posed
online
Workbook 3 27
Section 2: Understand how to reduce the risks posed
online
28 © LCG 2018
Section 3: Know about potential signs and behavioural
changes that could cause concern
In this section, you will explore the different signs and behavioural changes that may
indicate that someone is being affected by online activity. You will also learn about
the different types of support available for those affected by online issues and where
you can get advice about online safety.
Everyone is subject to moods and can be affected by things that happen in everyday
life. This includes being happy when something good happens or feeling anxious and
depressed when dealing with a difficult situation.
Not everyone is able to communicate their feelings about what is happening in their
life, but there are signs and behavioural changes that you can look out for that may
indicate that someone requires help or support.
It is important to understand that some of the signs and changes listed below can be
a common part of growing up for children and teenagers and may not be cause for
concern.
Potential signs that may be cause for concern include:
•• being withdrawn
•• being secretive
•• depression
•• taking dangerous risks
•• not doing well at work or school/college
•• abusing alcohol or drugs
•• spending a lot of time, or much more or less time, online, texting, gaming or using
social media
•• in children, soiled clothes or bed-wetting
•• unexplained physical injuries
•• being nervous
•• losing confidence
Workbook 3 29
Section 3: Know about potential signs and behavioural
changes that could cause concern
30 © LCG 2018
Section 3: Know about potential signs and behavioural
changes that could cause concern
Read the information in the following table to learn more about the different sources
of support for anyone affected by an online issue.
Workbook 3 31
Section 3: Know about potential signs and behavioural
changes that could cause concern
32 © LCG 2018
Section 3: Know about potential signs and behavioural
changes that could cause concern
Knowledge Activity 3: Using the links on page 32, create a handout that
can be given to either vulnerable people or college students which explains
how to use the Internet safely.
Summary
Workbook 3 33
Section 4: Extension activities
Further your knowledge and understanding of the topics in this workbook by completing
the following extension activities.
34 © LCG 2018
Section 4: Extension activities
Extension Activity 2: Go online and research what steps you can take to
verify whether a website is real or fake. Who should you report a fake website
to?
Well done!
You have now completed Workbook 3 and should attempt
the assessments. If you require any help or guidance,
please contact your Assessor/Tutor.
Workbook 3 35
TERRORISM
MONITORING