eSafety Commisioner

Freedom of information




Skip to main content SEARCH Search Report abuse <ul> <li> Educators </li> <li> Parents </li> <li> Kids </li> <li> Young people </li> <li> Women </li> <li> Seniors </li> <li> Diverse groups </li> <li> About us </li> <li> Report </li> <li> Key issues </li> </ul> <ul> <li> </li> <li> Educators <ul> <li>Main menuEducators</li> <li> Classroom Resources <ul> <li>Main menuClassroom Resources</li> <li> Hector's World <ul> <li>Main menuHector's World</li> <li> Student home </li> <li> Your personal information online </li> <li> Computer security </li> <li> Cyberbullying </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Keep It Sweet Online </li> <li> Be Secure <ul> <li>Main menuBe Secure</li> <li> Student home </li> <li> Quiz </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Making good choices online </li> <li> Cybersmart Challenge <ul> <li>Main menuCybersmart Challenge</li> <li> Student home </li> <li> Cybersmart Forever </li> <li> Cybersmart&nbsp;Detectives&nbsp. </li> <li> Cybersmart&nbsp;Hero&nbsp. </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> #Game On <ul> <li>Main menu#Game On</li> <li> Student home </li> <li> Meet the&nbsp;characters </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> The Lost Summer <ul> <li>Main menuThe Lost Summer</li> <li> Student home </li> <li> Teacher support </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> What’s your brand? </li> <li> Respect Matters </li> <li> Be Deadly Online <ul> <li>Main menuBe Deadly Online</li> <li> Student and community home </li> <li> Cyberbullying </li> <li> Social media and privacy </li> <li> Sending nudes and sexting </li> <li> Your digital footprint </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Tagged <ul> <li>Main menuTagged</li> <li> Student Home </li> <li> Arabic versions </li> <li> Chinese versions </li> <li> Greek versions </li> <li> Italian versions </li> <li> Vietnamese versions </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> The YeS Project <ul> <li>Main menuThe YeS Project</li> <li> Student home </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Young and eSafe <ul> <li>Main menuYoung and eSafe</li> <li> Student home </li> <li> Respect </li> <li> Responsibility </li> <li> Empathy </li> <li> Resilience </li> <li> Critical thinking </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Rewrite Your Story <ul> <li>Main menuRewrite Your Story</li> <li> Student page </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> The Internet and the Law </li> <li> Online safety posters and conversation starters </li> <li> Being safe online – Easy Read booklet </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> eSafety Early Years program for educators <ul> <li>Main menueSafety Early Years program for educators</li> <li> Checklist for early learning services </li> <li> Co-creating an Online Safety Agreement </li> <li> Online safety teaching posters </li> <li> Learn about online safety through play </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Toolkit for Schools <ul> <li>Main menuToolkit for Schools</li> <li> Prepare </li> <li> Engage </li> <li> Educate </li> <li> Respond </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Toolkit for Universities <ul> <li>Main menuToolkit for Universities</li> <li> Universities </li> <li> Academics </li> <li> Students </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Virtual classrooms <ul> <li>Main menuVirtual classrooms</li> <li> Be an eSafe kid: Being an upstander </li> <li> Be an eSafe kid: Fake news, real harms </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Video library </li> <li> Trusted eSafety Providers program <ul> <li>Main menuTrusted eSafety Providers program</li> <li> Find a provider </li> <li> Provide feedback </li> <li> Become a Trusted eSafety Provider </li> <li> Trusted eSafety Provider program FAQs </li> <li> Downloads </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Training for professionals <ul> <li>Main menuTraining for professionals</li> <li> eSafety Early years professional learning </li> <li> Pre-service teacher program </li> <li> Professional learning program for teachers <ul> <li>Main menuProfessional learning program for teachers</li> <li> Cyberbullying: factsheet </li> <li> Cyberbullying: scenarios </li> <li> Inappropriate content: factsheet </li> <li> Inappropriate content: scenarios </li> <li> Unwanted contact and grooming: factsheet </li> <li> Unwanted contact and grooming: scenarios </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> National School Chaplaincy Program </li> <li> Training for university support staff </li> <li> Mental health and social workers </li> <li> Meet our training team </li> <li> Training and presentations FAQ </li> <li> Webinar support </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Corporate and community education <ul> <li>Main menuCorporate and community education</li> <li> Presentations for businesses </li> <li> Presentations for youth focused organisations </li> <li> Training for peak sporting organisations and clubs </li> <li> Library presentations for older Australians </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Parents <ul> <li>Main menuParents</li> <li> The big issues <ul> <li>Main menuThe big issues</li> <li> Cyberbullying </li> <li> Online pornography </li> <li> Sending nudes and sexting </li> <li> Time online </li> <li> Online gaming </li> <li> Unwanted contact and grooming </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Skills and advice <ul> <li>Main menuSkills and advice</li> <li> Online safety basics </li> <li> Good habits start young </li> <li> Are they old enough? </li> <li> The hard-to-have conversations </li> <li> Taming the technology </li> <li> Privacy and your child </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Children under 5 <ul> <li>Main menuChildren under 5</li> <li> It's never too early to start talking about online safety </li> <li> Encourage your child to ask for help </li> <li> How to choose good online content </li> <li> Online safety for under 5s booklet </li> <li> Online safety picture book and song <ul> <li>Main menuOnline safety picture book and song</li> <li> Swoosh, Glide and Rule Number 5 </li> <li> My Family Rules </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Story puzzles with Swoosh and Glide </li> <li> Family tech agreement </li> <li> eSafety Early Years overview </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Gift Guide <ul> <li>Main menuGift Guide</li> <li> 3D printers </li> <li> Drones </li> <li> Gaming memberships </li> <li> Gaming </li> <li> Robotic toys </li> <li> Smart Toys </li> <li> Smart home </li> <li> Smartphones </li> <li> Tablets </li> <li> Virtual Reality </li> <li> Wearables </li> <li> Wireless headphones and gaming headsets </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Quizzes and interactives </li> <li> Online safety book </li> <li> Webinars </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Kids </li> <li> Young people <ul> <li>Main menuYoung people</li> <li> Cyberbullying </li> <li> Be an upstander — not a bystander </li> <li> Someone is creating drama online </li> <li> I’m being pressured to send nudes </li> <li> My nudes have been shared </li> <li> Receiving unwanted nudes </li> <li> Your digital reputation </li> <li> Unsafe or unwanted contact — signs to look out for </li> <li> Online dating </li> <li> Violent or inappropriate content </li> <li> Online hate </li> <li> Catfishing </li> <li> Fake news </li> <li> Protecting your identity </li> <li> I’ve been called a bully </li> <li> Banter vs bullying </li> <li> Someone is threatening to share my nudes </li> <li> Pressures from social media </li> <li> Online gaming </li> <li> Trolling </li> <li> Keeping your online accounts secure </li> <li> Spending too much time online </li> <li> Consent for sharing photos and videos </li> <li> Helping adults get online </li> <li> Being out, trans or gender diverse online </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Women <ul> <li>Main menuWomen</li> <li> Know the facts about women online </li> <li> Using your device safely <ul> <li>Main menuUsing your device safely</li> <li> Starting out </li> <li> Phones and tablets </li> <li> Laptops and computers </li> <li> Wearables and fitness trackers </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Connecting safely <ul> <li>Main menuConnecting safely</li> <li> Wi-fi and hotspots </li> <li> Web browsers </li> <li> Apps </li> <li> The cloud </li> <li> Bluetooth </li> <li> GPS and location-based services </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Being social <ul> <li>Main menuBeing social</li> <li> Email </li> <li> Social media </li> <li> Online dating </li> <li> Sexting and sending nudes </li> <li> Blogging </li> <li> Online gaming </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Life admin <ul> <li>Main menuLife admin</li> <li> Online banking </li> <li> Online shopping </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Online abuse targeting women </li> <li> Domestic and family violence </li> <li> Women Influencing Tech Spaces <ul> <li>Main menuWomen Influencing Tech Spaces</li> <li> About WITS </li> <li> Benefits of social media </li> <li> Why women? </li> <li> What is cyber abuse? </li> <li> Psychological armour </li> <li> Taking action </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Seniors <ul> <li>Main menuSeniors</li> <li> Online safety for grandparents and carers <ul> <li>Main menuOnline safety for grandparents and carers</li> <li> Grandparents and Carers book </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> How to help seniors get online </li> <li> Learn the basics and beyond </li> <li> Staying safer online </li> <li> Online abuse and scams </li> <li> Making video calls </li> <li> Looking out for the kids </li> <li> Be Connected Young Mentors <ul> <li>Main menuBe Connected Young Mentors</li> <li> Frequently asked questions </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Training and resources </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Diverse groups <ul> <li>Main menuDiverse groups</li> <li> Protecting voices at risk online </li> <li> Aboriginal and Torres Strait Islander peoples <ul> <li>Main menuAboriginal and Torres Strait Islander peoples</li> <li> Your Online Journey </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Culturally and linguistically diverse <ul> <li>Main menuCulturally and linguistically diverse</li> <li> Help in languages other than English <ul> <li>Main menuHelp in languages other than English</li> <li> Macedonian </li> <li> عربي (Arabic) </li> <li> Khmer (Cambodian) </li> <li> 简体中文 (Simplified Chinese) </li> <li> 繁體中文 (Traditional Chinese) </li> <li> درى (Dari) </li> <li> Thuɔŋjäŋ (Dinka) </li> <li> Tagalog (Filipino) </li> <li> ελληνικά (Greek) </li> <li> Hazaragi </li> <li> हिंदी (Hindi) </li> <li> Italiano (Italian) </li> <li> Karen </li> <li> 한국어 / 조선말 (Korean) </li> <li> Pacific Islands (English) </li> <li> ارسی (Persian) </li> <li> ਪੰਜਾਬੀ (Punjabi) </li> <li> Soomaali (Somali) </li> <li> South Asian (English) </li> <li> Español (Spanish) </li> <li> தமிழ் (Tamil) </li> <li> ภาษาไทย (Thai) </li> <li> Tiếng Việt (Vietnamese) </li> <li> Türkçe (Turkish) </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Lesbian, gay, bi, trans, intersex or queer </li> <li> Living with disability <ul> <li>Main menuLiving with disability</li> <li> Help in Easy Read format </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> About us <ul> <li>Main menuAbout us</li> <li> Safety by Design <ul> <li>Main menuSafety by Design</li> <li> Industry self-assessment tools </li> <li> Investors <ul> <li>Main menuInvestors</li> <li> Investor resources </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> SbD timeline </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Who we are <ul> <li>Main menuWho we are</li> <li> About the Commissioner </li> <li> Our structure </li> <li> Our legislative functions </li> <li> Social media Tier Scheme </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> What we do <ul> <li>Main menuWhat we do</li> <li> Our programs <ul> <li>Main menuOur programs</li> <li> Community education and training </li> <li> Online Safety Grants Program <ul> <li>Main menuOnline Safety Grants Program</li> <li> FAQs </li> <li> Round 1 Grants 2020 </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> eSafety Early Years program </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Australian Government agencies supporting online safety and security </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> What we don't do </li> <li> How we can help </li> <li> How to report online abuse to us </li> <li> Counselling and support services </li> <li> Consultation and cooperation <ul> <li>Main menuConsultation and cooperation</li> <li> Public consultation </li> <li> Working with social media </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Corporate documents <ul> <li>Main menuCorporate documents</li> <li> Annual reports </li> <li> Accountability reporting </li> <li> Freedom of information <ul> <li>Corporate documentsFreedom of information</li> <li> Agency Plan </li> <li> Disclosure log </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Privacy <ul> <li>Main menuPrivacy</li> <li> Personal information collection notices </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Disclaimer and copyright </li> <li> Website accessibility </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Newsroom </li> <li> Latest blogposts </li> <li> Events <ul> <li>Main menuEvents</li> <li> Safer Internet Day 2021 <ul> <li>Main menuSafer Internet Day 2021</li> <li> Educators <ul> <li>Main menuEducators</li> <li> Young children </li> <li> Primary years </li> <li> Secondary years </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Queensland takes on cyberbullying </li> <li> National Child Protection Week 2020 </li> <li> Play it safe and fair — online and offline </li> <li> Safer Internet Day 2020 <ul> <li>Main menuSafer Internet Day 2020</li> <li> 2020 Champions </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Research <ul> <li>Main menuResearch</li> <li> Adults’ negative online experiences <ul> <li>Main menuAdults’ negative online experiences</li> <li> Adults’ negative online experiences - infographic </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Best Practice Framework for Online Safety Education </li> <li> Building Australian adults’ confidence and resilience online <ul> <li>Main menuBuilding Australian adults’ confidence and resilience online</li> <li> Building Australian adults’ confidence and resilience online - infographic </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> COVID-19 impacts on Australian adults’ online activities and attitudes <ul> <li>Main menuCOVID-19 impacts on Australian adults’ online activities and attitudes</li> <li> COVID-19 Key findings - infographic </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Children and technology-facilitated abuse in domestic and family violence situations <ul> <li>Main menuChildren and technology-facilitated abuse in domestic and family violence situations</li> <li> Children and technology-facilitated abuse - infographic </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Digital lives of Aussie teens <ul> <li>Main menuDigital lives of Aussie teens</li> <li> Time online and activities – infographic </li> <li> Negative experiences and responses to them – infographic </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Online hate speech </li> <li> Online safety for young people with an intellectual disability </li> <li> Adults who engage in image-based abuse </li> <li> Online safety </li> <li> Parenting in the digital age </li> <li> Mentoring older Australians </li> <li> Women from diverse backgrounds </li> <li> Digital parenting <ul> <li>Main menuDigital parenting</li> <li> Digital families </li> <li> Supervising preschoolers online </li> <li> Parenting and screen time </li> <li> Parenting and pornography </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Digital behaviours of older Australians <ul> <li>Main menuDigital behaviours of older Australians</li> <li> Attitudes and motivations </li> <li> Digital confidence </li> <li> Fear of technology </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Youth and digital dangers <ul> <li>Main menuYouth and digital dangers</li> <li> Connecting online </li> <li> Negative online experiences </li> <li> Young people and social media usage </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Youth and online gaming - state of play <ul> <li>Main menuYouth and online gaming - state of play</li> <li> Youth and online gaming </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Young people and sexting </li> <li> Image-based abuse <ul> <li>Main menuImage-based abuse</li> <li> Prevalence and pathways </li> <li> Impacts and needs </li> <li> Bystanders </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Young people and social cohesion <ul> <li>Main menuYoung people and social cohesion</li> <li> Online hate, bullying and violence </li> <li> Trust in online information sources </li> <li> Online relationships </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Digital participation <ul> <li>Main menuDigital participation</li> <li> Young and social online </li> <li> Connected kids and teens </li> <li> Cyberbullying and other digital dangers </li> <li> Kids online — parent views </li> <li> Parenting online </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Kids and teens online </li> <li> Social media use and cyberbullying <ul> <li>Main menuSocial media use and cyberbullying</li> <li> Social media and kids </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Tech trends and challenges <ul> <li>Main menuTech trends and challenges</li> <li> Anonymity and identity shielding </li> <li> Immersive technologies </li> <li> Online harmful sexual behaviours under 18 </li> <li> Sextortion </li> <li> Doxing </li> <li> Deepfakes </li> <li> End-to-end encryption </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Glossary of terms </li> <li> Jobs with eSafety </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Report <ul> <li>Main menuReport</li> <li> Report cyberbullying <ul> <li>Main menuReport cyberbullying</li> <li> FAQ about making a complaint </li> <li> How we handle complaints </li> <li> Collecting evidence </li> <li> Support for cyberbullying </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Report adult cyber abuse <ul> <li>Main menuReport adult cyber abuse</li> <li> FAQ about making a report </li> <li> How we handle reports </li> <li> Collecting evidence </li> <li> Support for adult cyber abuse </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Report image-based abuse <ul> <li>Main menuReport image-based abuse</li> <li> FAQ about making a report </li> <li> How we handle reports </li> <li> Collecting evidence </li> <li> Support for image-based abuse </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Report illegal and harmful content <ul> <li>Main menuReport illegal and harmful content</li> <li> FAQ about making a report </li> <li> What we can investigate </li> <li> What we can't investigate </li> <li> The actions we can take </li> <li> Law enforcement partners </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Key issues <ul> <li>Main menuKey issues</li> <li> COVID-19 <ul> <li>Main menuCOVID-19</li> <li> Advice booklet for parents and carers </li> <li> Advice for young people </li> <li> Open letter to parents and carers </li> <li> Media, misinformation and scams </li> <li> Open letter to school principals and teachers </li> <li> Tips for online collaboration tools </li> <li> Working alone with children — online </li> <li> Managing your online wellbeing </li> <li> Advice for women experiencing domestic violence </li> <li> International advice for frontline workers supporting women </li> <li> International advice for parents </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Fake news and misinformation </li> <li> The eSafety Guide </li> <li> Cyberbullying </li> <li> Adult cyber abuse <ul> <li>Main menuAdult cyber abuse</li> <li> Report cyber abuse to social media services </li> <li> Get help from the police </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Image-based abuse <ul> <li>Main menuImage-based abuse</li> <li> Take action <ul> <li>Main menuTake action</li> <li> Get help to remove images and video </li> <li> Report to the eSafety Commissioner </li> <li> Report to social media service or website </li> <li> Deal with sextortion </li> <li> Get help from the police </li> <li> Manage abuse sent via text or email </li> <li> Civil penalties scheme </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Support <ul> <li>Main menuSupport</li> <li> Talking with friends and family </li> <li> 10 ways to get through image-based abuse </li> <li> For family and friends </li> <li> Useful international websites </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Quick guides <ul> <li>Main menuQuick guides</li> <li> Image-based abuse </li> <li> Aboriginal and Torres Strait Islander </li> <li> Lesbian, gay, bi, trans, queer and/or intersex </li> <li> Family, friends and bystanders </li> <li> Righting the wrong </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Legal assistance <ul> <li>Main menuLegal assistance</li> <li> Find a lawyer </li> <li> Protection orders </li> <li> What's the law in my state or territory? </li> <li> Statements and statutory declarations </li> <li> Legal case studies </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Your stories <ul> <li>Main menuYour stories</li> <li> Anna </li> <li> Ariba </li> <li> Emily </li> <li> Kate </li> <li> Jess </li> <li> Luca </li> <li> May </li> <li> Michael </li> <li> Min-jun </li> <li> Mitch </li> <li> Priya </li> <li> Steven </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> FAQ </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Illegal and harmful content </li> <li> Domestic and family violence <ul> <li>Main menuDomestic and family violence</li> <li> Know the facts </li> <li> Safety quiz and interactive tour <ul> <li>Main menuSafety quiz and interactive tour</li> <li> Technology checkup quiz </li> <li> Technology tour </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> What is technology-facilitated abuse? <ul> <li>Main menuWhat is technology-facilitated abuse?</li> <li> Online abuse </li> <li> Cyberstalking </li> <li> Image-based abuse </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> What are the warning signs? </li> <li> Online safety planning <ul> <li>Main menuOnline safety planning</li> <li> Online safety checklist </li> <li> Online safety checklist for friends and family </li> <li> Social media checklist </li> <li> Securing your accounts and devices </li> <li> Keeping children safe </li> <li> Online safety advice </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Help and support <ul> <li>Main menuHelp and support</li> <li> Find support </li> <li> For friends and family </li> <li> Get help from the police </li> <li> Legal help </li> <li> Collecting evidence </li> <li> Get help in your language </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Video library </li> <li> Your stories <ul> <li>Main menuYour stories</li> <li> Alison </li> <li> Lin </li> <li> Bella </li> <li> Sam </li> <li> Alicia </li> <li> Rose </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Training for frontline workers </li> <li> Orderable resources </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> How to <ul> <li>Main menuHow to</li> <li> Remove images, posts or other content </li> <li> Use your device safely </li> <li> Connect safely </li> <li> Get help with technology </li> <li> Balance time online </li> <li> Plan your digital legacy </li> <li> Protect your personal information </li> <li> Use social media and online chat </li> <li> Collect evidence <ul> <li>Main menuCollect evidence</li> <li> Taking a screenshot on a Mac </li> <li> Taking a screenshot on a PC&nbsp;&nbsp. </li> <li> Taking a screenshot on an Android device </li> <li> Taking a screenshot on an Apple device </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Staying safe <ul> <li>Main menuStaying safe</li> <li> Sending nudes and sexting </li> <li> Unwanted contact </li> <li> Online scams and identity theft </li> <li> Your digital reputation </li> <li> Sextortion </li> <li> Gaming </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Tailored advice <ul> <li>Main menuTailored advice</li> <li> International leadership and collaboration <ul> <li>Main menuInternational leadership and collaboration</li> <li> Global advice for parents and carers <ul> <li>Main menuGlobal advice for parents and carers</li> <li> Early Years — Online safety advice </li> <li> Early Years — Story puzzles </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Frontline workers and support providers <ul> <li>Main menuFrontline workers and support providers</li> <li> Out-of-home carers </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li> Libraries and library workers </li> <li> Sporting organisations, clubs and community groups </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> </li> <li>Search</li> <li>Report abuse<br> <br> <br> <br> <br> </li> </ul> About us <p> <strong>Tips on how to&nbsp;stay safe online&nbsp;during the COVID-19 pandemic</strong> </p> Breadcrumb <ol> <li> About us </li> <li> Corporate documents </li> <li> Freedom of information </li> </ol> <ul> <li> Corporate documents <ul> <li> Annual reports </li> <li> Accountability reporting </li> <li> Freedom of information <ul> <li> Agency Plan </li> <li> Disclosure log </li> </ul> </li> <li> Privacy <ul> <li> Personal information collection notices </li> </ul> </li> <li> Disclaimer and copyright </li> <li> Website accessibility </li> </ul> </li> </ul> Freedom of information <p>The Freedom of Information Act 1982 (FOI Act) gives individuals a legally enforceable right of access to government documents, subject to specific exemptions.</p> <p>The FOI Act applies to Australian Government ministers and most agencies. The eSafety Commissioner (eSafety) is an agency for the purposes of the FOI Act.&nbsp;</p> <p>Staff of the Australian Communications and Media Authority (ACMA) are made available to assist the eSafety Commissioner in performing her functions and exercising her powers.&nbsp;</p> <p>In certain circumstances, eSafety has adopted the ACMA’s policies, procedures, systems and guidelines.</p> Information Publication Scheme&nbsp;(IPS) <p>The FOI Act establishes an Information Publication Scheme (IPS) which requires us to publish a range of information, including:</p> <ul> <li>Our agency plan&nbsp;which outlines how eSafety will implement the IPS requirements</li> <li>Who we are&nbsp;including our structure,&nbsp;information about the eSafety Commissioner&nbsp;and our legislative functions</li> <li>What we do&nbsp;including links to operational information relating to our functions and activities</li> <li>Our annual reports</li> <li>Accountability reporting&nbsp;including files created and executive remuneration</li> <li>Public consultation&nbsp;providing details of any consultation processes open for contribution, as well as how you may engage with us as part of our regulatory functions</li> <li>Freedom of Information — outlining the process for making a request under the FOI Act and how we’ll handle your request</li> <li>Our disclosure log</li> <li>Contact us&nbsp;including the telephone number and an email address for a contact officer who can be contacted about access to eSafety’s information or documents under the FOI Act.</li> </ul> How to make a request under the FOI&nbsp;Act <p>If you want to request access under the FOI Act to one or more of the documents we hold, your request must:</p> <ul> <li>be in writing</li> <li>state that the request is an application for the purposes of the Freedom of information Act 1982</li> <li>provide information about each document you are seeking to access to enable us to process your request, and</li> <li>provide a postal, email or fax address for us to reply to.</li> </ul> <p>You can lodge your request via:</p> <ul> <li>Online form: available on our contact us&nbsp;page</li> <li>Post: The FOI Coordinator, Office of the eSafety Commissioner, PO Box Q500, Queen Victoria Building NSW 1230</li> </ul> <p>A third party can also make a request on your behalf, if you provide written authority.</p> Time for processing your&nbsp;request <p>We will notify you of our decision within a 30-day period commencing the day after we receive your request, unless that period is extended or suspended in accordance with the FOI Act.</p> Charges for processing your&nbsp;request <p>There is no application fee for an FOI request. The first five hours of decision-making time are free for all applicants.</p> <p>Charges may be imposed to reimburse eSafety for the costs incurred in searching, copying, reproducing or sending the information contained in your request.</p> <p>There are no processing charges for requests for access to documents containing only personal information about you.</p> <p> <strong>The main charges are:</strong> </p> <ul> <li>search and retrieval — $15 per hour</li> <li>decision making — $20 per hour</li> <li>photocopy — 10 cents per page</li> <li>inspection — $6.25 per half hour.</li> </ul> <p>If we do decide to impose a charge, we will notify you beforehand. You can also ask for the charge to be waived or reduced for certain reasons, including financial hardship or on the grounds of public interest. You can find more information on the Office of the Australian Information Commissioner’s FOI charges webpage.</p> Access to&nbsp;documents <p>We may refuse your request to access documents, if the document falls within a specific exemption in the FOI Act. This includes that disclosure would, or could reasonably be expected to, prejudice the conduct of an investigation into a possible breach of the law or have a substantial adverse effect on the proper and efficient conduct of eSafety’s operations. We may also refuse access where the information is available to the public for a fee or other charge.</p> <p>eSafety’s work in relation to offensive or illegal content under Schedule 5 and 7 of the Broadcasting Services Act 1992 is a specific exemption in the FOI Act.</p> Review of a&nbsp;decision <p>You can request in writing that we reconsider our decision through an internal review. An internal review will be conducted by another officer in our agency. We will advise you of the outcome of our review within 30 days of receiving your request.</p> Information Commissioner&nbsp;review <p>You can ask the Australian Information Commissioner to review our original decision or our decision on internal review within 60 days of the date of decision (or 30 days after you are notified if you are an affected third party). The Information Commissioner can affirm or vary the decision or substitute a new decision. The Information Commissioner may decide not to conduct a review in certain circumstances. More information is available at the Office of the Australian Information Commissioner (OAIC).</p> Complaints <p>If you are unhappy with the way we have handled your request, you can complain to the Commonwealth Ombudsman&nbsp;who may investigate our actions.</p> Enquiries <p>If you have any enquiries about the FOI process, please contact us through&nbsp;our contact us&nbsp;page.</p> <strong>See&nbsp;also</strong> <p>Our disclosure log, which lists the information we have released in response to FOI access requests.</p> Sign up <p>to get the latest releases to your inbox</p> Sign up now Find out <p>how to make a report to us</p> Learn How <p> </p> <p>eSafety acknowledges the Traditional Custodians of country throughout Australia and their continuing connection to land, waters and community. We pay our respects to Aboriginal and Torres Strait Islander cultures, and to Elders past, present and emerging. Aboriginal and Torres Strait Islander peoples should be aware that this website may contain images and voices of people who have died.</p> <p> </p> <ul> <li> About us </li> <li> Contact us </li> <li> Disclaimer and copyright </li> <li> Accessibility </li> <li> Privacy policy </li> <li> Freedom of information </li> </ul>





Comments:
On 2021-04-12 09:07:27 UTC, Agnes_de_Lion (20760) Staff wrote:

Document has been crawled
Old length: 0 CRC 0
New length: 35949 CRC 4282948799