Telstra Foundation gives $2M to reduce online bullying

 

Telstra has set aside $2 million for a new program aimed at reducing bullying and harassment of children using the internet and mobile phones across Australia.

The new program is being launched by the Telstra Foundation and will provide grants starting from $75,000 per year over three years for organisations to tackle cyber-safety issues ranging from bullying to internet addiction and identity theft.

Telstra Foundation chairman, Herb Elliott, said children were using the internet and mobile phones at an increasingly young age but unfortunately some were becoming victims of bullying and harassment and even crime.

"Sadly, there are more and more reported incidents of children and young people who are victimised at the hands of bullies or people doing the wrong thing online," Elliott said.

According to Elliot the cyber safety grants will focus on funding programs to help educate parents about online technology and steps they can take to create a safe online learning and social environment for their child.

"The Telstra Foundation is putting a 'spotlight' on cyber safety and wants to work with people in community organisations with new ideas and solutions to help keep children safe online," he said.

The program will focus on four areas; encouraging children and young people to be actively involved in developing solutions; educating parents to become more competent in addressing cyber safety issues; research to enrich understanding of cyber safety issues; and approaches that bring together the community to share ideas and information.

Further information on the Telstra Foundation's Cyber Safety Grants and an online application form is available at http://www.telstrafoundation.com/. Applications open on 4 February 2008 and close on 4 April 2008.

Telstra Foundation gives $2M to reduce online bullying
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1082

Vote