Skip to main content

Online Safety Glossary

A plain-language glossary of online safety terminology. If you have come across a term you do not recognise, you will likely find it explained here.

A

Algorithm

A set of rules used by apps and websites to decide what content to show you. Social media algorithms learn what keeps you scrolling and show you more of it.

B

Block

A feature on most apps that stops a specific person from contacting you or seeing your content. Blocking someone is always okay if they are making you uncomfortable.

C

Catfishing

When someone creates a fake online identity to deceive others, often using someone else's photos and a made-up name.

CEOP

The Child Exploitation and Online Protection command, part of the National Crime Agency. You can report concerns about online child exploitation at ceop.police.uk.

Content filtering

Technology that blocks access to certain types of websites or online content. It can be applied at the network level (on your router) or on individual devices.

Cookies

Small files stored on your device by websites to remember your preferences, login details, and browsing habits. Some cookies track your activity across multiple sites.

Cyberbullying

Repeated, deliberate harmful behaviour carried out through digital devices such as phones, tablets, and computers. It can include mean messages, exclusion, and sharing embarrassing content.

Cyberstalking

Using the internet to repeatedly harass, monitor, or threaten someone. This can include tracking someone's location, monitoring their social media, or sending unwanted messages.

D

Dark web

A part of the internet that is not indexed by search engines and requires special software to access. It is often associated with illegal activity.

DBS check

Disclosure and Barring Service check. A background check used in the UK to determine whether someone is suitable to work with children or vulnerable adults.

Deepfake

AI-generated video, audio, or images that convincingly show a real person saying or doing something they never actually did.

Digital footprint

The trail of data you leave behind when you use the internet — including posts, comments, searches, and data collected by websites. Some of it is permanent.

DNS filtering

A method of blocking harmful websites by changing the Domain Name System settings on your router. It protects all devices on your network without installing software on each one.

Doxing

Publicly sharing someone's private information — such as their home address, phone number, or workplace — without their consent, usually with malicious intent.

E

Encryption

The process of scrambling data so that only the intended recipient can read it. End-to-end encryption means even the platform itself cannot see the content of your messages.

F

Family Link / Screen Time

Built-in parental control tools on Android (Family Link) and Apple (Screen Time) devices. They allow parents to manage app access, screen time, and content restrictions.

G

Grooming

When someone builds a relationship with a child in order to exploit or abuse them. Online grooming often involves flattery, gifts, secrecy, and gradually pushing boundaries.

H

Hallucination (AI)

When an AI chatbot generates information that sounds confident and plausible but is entirely fabricated. AI tools do not verify facts — they predict likely-sounding words.

I

In-app purchases

Purchases made within an app, often for virtual items, extra features, or game currency. Children can spend real money without realising it if purchases are not restricted.

L

LADO

Local Authority Designated Officer. The person who manages allegations against adults who work with children, such as teachers, coaches, or care workers.

Livestreaming

Broadcasting video in real time to an audience. Unlike pre-recorded content, livestreams cannot be moderated before they are seen.

Loot box

A feature in some games where players pay for a randomised selection of virtual items. Considered by many to be a form of gambling aimed at children.

M

Metadata

Data about data. For example, a photo's metadata can include the date, time, and GPS location where it was taken — information that may be shared unknowingly.

Money mule

Someone who allows their bank account to be used to transfer illegally obtained money. Teenagers are increasingly recruited for this through social media. It is a criminal offence.

P

Parental controls

Settings and tools that allow parents to manage what their children can access on devices, apps, and networks. They include content filters, screen time limits, and communication restrictions.

PEGI rating

Pan European Game Information rating. The age classification system used for video games in the UK and Europe, ranging from PEGI 3 to PEGI 18.

Phishing

A type of scam where someone sends a message designed to trick you into sharing personal information, clicking a malicious link, or downloading harmful software.

R

Report / reporting

The process of notifying a platform, organisation, or authority about harmful content or behaviour. Most apps have a built-in reporting feature accessible from the offending content.

Revenge porn

The non-consensual sharing of intimate images, usually by a former partner. In the UK, this is a criminal offence. The Revenge Porn Helpline (0345 6000 459) can help with removal.

S

SafeSearch

A setting built into search engines like Google and Bing that filters explicit content from search results. It should be enabled on all devices children use.

Sextortion

A form of blackmail where someone threatens to share intimate images of a person unless they comply with demands — often for money or more images.

T

Two-factor authentication (2FA)

A security feature that requires two forms of verification to access an account — typically a password plus a code sent to your phone. Significantly reduces the risk of account hacking.

V

VPN

Virtual Private Network. Software that encrypts your internet connection and routes it through a server elsewhere. Can be used for privacy, but children may also use VPNs to bypass content filters.