Protect your Children & Leave more Cash in Your Pocket

Protect your Children & Leave more Cash in Your Pocket

Posted: October 29, 2013 | Admin

Parents often feel at their wits end when it comes to technology. They want to protect their kids but are seduced by the apparent complexity of the internet and the range of devices by which their kids access it.

But it is not just the bullies and online predators they need to worry about. Reports in the media have highlighted how children who can access the iTunes store via iPods, iPads and iPhones can run up huge bills downloading Apps and games. In fact a six year old happily clicked away £2,000.

The irony is however that the technology used provides settings to protect your children and your pocket. Safety settings in Apple products allow you to make decisions about what Apps can be downloaded, whether to permit access to YouTube or Facebook and the age restrictions of the iTunes movies it will, or perhaps more importantly will not play.

For an easy to follow guide for anyone using an iPhone try the h2bsafer for iPhone App


Does Football Deserve a Red Card?

Posted: January 17, 0207 | Admin

A Time for Credible rather than Comfortable Choices

football-pitch-training-guideThe headline that Chelsea Football Club has been cleared of breaking any Premiership rules whist technically true is potentially misleading; the devil, as always is in the detail. An informed examination reveals what the headline should have been; Until recently the Premiership’s rules for safeguarding children were simply not fit for purpose.

Whilst the loophole about reporting an allegation to them has been closed, in my opinion this loophole reflected a culture which lacked a firm child centred focus. It revealed an apparent willingness by some to hide behind the fact that whilst failing to report and escalate concerns was wrong, it wasn’t actually against the rules.

football-pitch-training-guideAs everyone in football begins to reflect on the harm done and react to the lessons learned many will go through the motions of ticking boxes and making grand statements about their commitment to keep young players safe. They will check, on paper at least, that everything is as it should be. However, it is people and their behaviour that hurts children. It is people and their behaviour not paper exercises that really counts when it comes to safeguarding the young and vulnerable.

Vetting only weeds out those already captured. The predators who infiltrate the game, those who’ve never been caught, they get the training, they have the power and influence and they often use it to abuse whilst they hide in plain sight. Whatever individual clubs and organisations do next, it must be contemporary, credible and relevant.

Safeguarding needs to be contextual. The good the bad and the ugly aspects of children and young people’s lives will invariably be reflected in their social media footprint; the online spaces, the public and private places they frequent. Given what we’ve learned about players’ online engagement with young fans and the fact that today’s digital world offers the predator a new means to communicate, influence and control their victims, then no review will be contemporary, credible or relevant if social media and its use is not at its core.

Successful Safeguarding is a Shared Responsibility
Clubs must engage staff, parents, carers and young players themselves. The conversation will never be as relevant as it is right now! It is real, it is on the news, in the daily papers and all over social media. So this is the time to ensure that everyone knows what to look for and what to do if they’ve seen it or heard it or if something just doesn’t feel right. Trust your instinct. The only person who will feel really uncomfortable whilst this conversation takes place is the predator within.

A Game of Two Halves
Auditing policy and compliance may be a credible start and can be compared to your defensive framework. But, to turn your defence into attack it is essential to have the programme and tools that ‘educate and empower’ all those who share the responsibility of safeguarding the young people in our care.

A Word to the Associations.
football-pitch-training-guideThe flow of young people into this sport we love so well is essential to its future success at both professional and amateur levels. Isn’t it about time we treated our most valuable asset with the importance it deserves.

Ensuring and assessing compliance cannot be a box ticking exercise; it must be treated with the same dynamic, relentlessness and unpredictable approach as drug testing in the best sports. Independent safeguarding teams turning up at a club unannounced and asking tough questions that test the effectiveness of policy and training. Seeking out parents, carers to check that they know what to do and who to speak to. Asking young players themselves if they know how to report when something inappropriate happens. These are the tactics that will deliver the results we need.

Now is the time to make credible rather than comfortable choices. When the FA, Premier League and clubs carry out independent safeguarding reviews in future they must begin by using the right people, individuals with absolute independence and a credible safeguarding background. In my experience the right people, in the right roles are those who will always do the right thing, even when the rules suggest they could do otherwise.

Jim Gamble QPM was the founding Chief Executive of CEOP and is currently CEO of the INEQE Group of Specialist Safeguarding Companies and the Independent Chair of the City and Hackney Safeguarding Children Board (the first and only Board ever to be Judged outstanding by Ofsted)

Follow @JimGamble_INEQE

glimpse-header-400 copy

The Prime Minister, Google, and the Need for Focus

Posted: July 21, 2013 | Admin

The Prime Ministers personal involvement in an issue as important as child protection on the internet should be a good thing.  Properly focused it could be a great thing, but the key is in the focus and that must be on what best protects our children. Having watched the PM on The Andrew Marr Show today I was struck by the fact that his position is more coherent and that he is now publically recognising the positive support of many in the internet industry and the need for a holistic approach including enhanced policing.

One of the problems with the recent debate has been the singular focus on blocking and the bombardment with rhetoric that fails to differentiate between two very different commodities; child sex abuse images and adult pornography. Choosing to access the first leads to the commission of a criminal offence, whilst accessing the other, unless extreme does not.  So to compare or even worse mix the debate on the two issues is unhelpful.

Child sex abuse images should be blocked and ‘known’ images are. The 2012 Internet Watch Foundation (IWF) Annual Report states that, the IWF ‘..issued 35 notices to remove content hosted in the UK on 73 webpages. This relatively low number continues to show how the online industry is dedicated to making the UK a hostile environment to host such criminal content.’

Whilst it is hard to imagine how it might work without censoring public access, targeting certain search terms might be a useful tactic to divert or delay access to those sexually motivated to seek out such images, but it won’t stop them.  We need to focus our attack on the root cause of this disease, child sex abusers, people, not technology.  If people didn’t sexual abuse children, didn’t capture and share indecent images of them there would be no issue. So I suggest that those advising the PM stop drafting questionable letters attempting to manipulate ISP’s and start reading some of the information available to them from the agency created by government to combat online child abuse.

They might begin by considering what is not mentioned in the Child Exploitation and Online Protection (CEOP) Center strategic threat assessments – Google.  That is because the assessments focus on key areas of concern. In 2010 they reported that, Distribution of indecent images was the second most recorded activity reported to CEOP and the majority were believed to be passed via peer-to-peer (P2P) sites…’ In 2012 reporting on a new generation of P2P sharing they noted, ‘…users must first be invited into smaller groups…and …This means that it is not possible for those outside the group to see which files are available from a particular user. ‘ We know these offenders are not stupid and that they are moving in large numbers to the darkest recesses of the web, places you don’t get to by a simple click through from your standard search engine.

If part of this approach is focused on deterrence we should get the basics right, a deterrent must have teeth.  Think of the drink driving campaign, advertising, educating drivers, the public and licensees was useful but the greatest deterrent in days when drunk drivers felt immune from capture and prosecution was arrests and visible consequence.

You will not deter the 50,000 people CEOP estimate to have been downloading and sharing images in 2012 with pop ups, especially in areas of the net they don’t use.  You will only deter them when the likelihood of capture increases and that requires investment in Law Enforcement.  CEOP’s funding has not risen in real terms since this government came to power, it still operates on circa £6.4 million and no matter how you spin it that cannot reflect the commitment the Home Secretary made in 2010 to invest in and build on its success.  Standing still in this digital environment is falling behind and it must have been disheartening for many to hear police admit that they cannot cope with the volumes. 50,000 active offenders and only 192 arrests generated by CEOP intelligence and operations last year. The government must invest to save. In my opinion we are not even getting the first principals right, how many people are working today, Sunday 21st July, to identify, locate and rescue the real children trapped in these images? I would guess the answer is none or at best a handful.

So I hope we can use this renewed level of interest and the Prime Ministers commitment, to make a real difference.  Lets see investment in policing, education and victim support and if we are going to push the Internet industry to do more lets ask them to help fund a global scholarship.  By bringing together the best academics and psychologist in this field, credible practitioners and the finest data-crunching technology the world has to offer, we have a greater chance of building a better understanding about why these people are the way they are, why they do the things they do, and how we can stop them.

About the author: Jim Gamble is the Chief Executive at INEQE, Independent Chair at City of London and Hackney Safeguarding Children Board and founding CEO of CEOP. He was formally the Association of Chief Police Officers lead on Child Protection and Child Trafficking and the founder and initial Chair of the Virtual Global Task Force, an international collaboration to make children safer online.

New App for leading Belfast Solicitors – Edwards and Co

Posted: July 10, 2013 | Admin

Ineqe Group are pleased to announce the launch of an App for leading Belfast solicitors – Edwards and Co, who are believed to be the first legal firm to launch their own own App.  Chief Executive of Ineqe Group, Jim Gamble said, “Edwards and Company are a large legal practice offering a wide spectrum of legal services. We worked with them to develop the concept of an easy to use, easily accessible and informative mobile app. Both Ineqe Group and our client are extremely pleased with the results. The app provides numerous functions including access to legal advice,  automated appointments and the ability to record details of accidents”.

The app is available for free download on iPhone and Android via Apple App Store and Google Play.



Signs & Symptoms of Bullying – SOS for Teachers & Parents

Posted: November 16, 2014 | Admin

A person may indicate by signs or behaviour that they are being bullied, these indicators can be subtle so parents, carers, family and friends need to be sensitive to the early signs and symptoms.   The list below is not exhaustive and behaviour needs to be considered in context, so it should not automatically be assumed that a child displaying one or more of them is a victim of bullying.

 The indicators below can relate to many other issues;

The following prompt focuses on 3 areas, children’s attitudes to SCHOOL, a parent or teachers general OBSERVATIONS and things a child might SAY.


S – School 

  • Is frightened of walking to or from school or changes route
  • Doesn’t want to go on the school / public bus
  • Refuses to go to school
  • Suddenly starts asking to be driven to school
  • Begins to truant
  • Performance in school work begins to drop
  • Has dinner or other monies continually ‘lost’
  • Comes home ‘starving’

O – Observations

  • Becomes withdrawn, anxious or lacking in confidence
  • Becomes aggressive, abusive, disruptive or unreasonable
  • Starts stammering
  • Changes their usual routine
  • Feels ill in the mornings
  • Comes home with clothes torn, property damaged or ‘missing’
  • Has unexplained cuts or bruises
  • Bullying others
  • Changes in eating habits
  • Changes in a child’s attitude to accessing technology
  • Afraid to use the internet or mobile phone
  • Nervous or jumpy when a cyber message is received

S – Say – Things they might say?

  • Threatens or attempts suicide
  • Threatens or attempts self harm
  • Threatens or attempts to run away
  • Cries themselves to sleep at night or has nightmares
  • Asks for money or starts stealing money
  • Is frightened to say what is wrong
  • Gives improbable excuses for their behaviour.


Easy to Remember Passwords are Great – Hackers Love Them!

Posted: June 27, 2013 | Admin

How many passwords do you have? Or would a more relevant question be how many accounts does your password control?

We now need passwords for so many things. From accessing your social networking platform and bank account to authorizing your iTunes and setting up profile’s for online shopping.

Then of course there are the passcodes and PIN numbers for cash and credit cards, alarm codes and to remotely access messages on telephone answering machines. So it’s tempting to keep it simple and use one password and one PIN.

Keeping it simple makes it so much easier for those who gain access to that password or PIN. They can steal from multiple accounts.

Think about it? Do you have a password that you use for multiple purposes? Do you have a PIN code you use on all your credit cards? If you do, CHANGE THEM NOW.


DO – Change your Password frequently at least every 90 days

DO – Disable Stored passwords & clear those already stored on your computer

DON’T – Reuse passwords

DON’T – Use the same password or PIN for multiple accounts

DON’T – Click yes when a site offers to ‘Remember your Password.’ If you do, all your passwords are stored in one place on your device which provides ease of access for Hackers.

If you have a safe, or a safe place at home write them down and keep safe.

Defining Bullying

Posted: June 27, 2013 | Admin

Bullying is not new, the Internet did not invent it, but the anonymity it can provide can increase the opportunity for people to bully, intimidate, harass and upset others.  First and foremost it is important to think of bullying in the broadest sense.  Cyberbullying therefore is just an extension of bullying in the real world.

One of the aggravating factors of cyberbullying is that young people live simultaneously between the real and virtual worlds.  There is no hiding place for them if they occupy the same online space as the bully and it is harder for a parent or carer who is not part of their online life to identify the early signs that their child is being bullied.


There are many descriptions of bullying we have included a number here:

Bullying is repeated verbal, physical, social or psychological behaviour that is harmful and involves the misuse of power by an individual or group towards one or more persons. Cyberbullying refers to bullying through information andcommunication technologies. This can be done through the use of mobile phones or social media websites such as Facebook and Twitter.

Bullying can involve humiliation, domination, intimidation, victimisation and all forms of harassment including that based on sex, race, disability, homosexuality or transgender. Bullying of any form or for any reason can have long term effects on those involved including bystanders.

Bullying can happen anywhere including: at school, travelling to and from school, in sporting teams, between neighbours or in the workplace.


  • verbal e.g. name calling, teasing, abuse, putdowns, sarcasm, insults, threats
  • physical e.g. hitting, punching, kicking, scratching, tripping, spitting
  • social e.g. ignoring, excluding, ostracising, alienating, making inappropriate gestures
  • psychological e.g. spreading rumours, dirty looks, hiding or damaging possessions, malicious SMS and email messages, inappropriate use of camera phones.


Conflict or fights between equals and single incidents are not defined as bullying. Bullying behaviour is not:

• children not getting along well

• a situation of mutual conflict

• single episodes of nastiness or random acts of aggression or intimidation.


Translate »