STEM Education Accredited Provider Logo

An attempt to create a safe and secure eLearning space for all

Every child needs a facilitator online/offline to grow with learning experiences as they pass by. However, with utmost precautionary measures

Your Child, Our Concern

Growing up comes with lots of exciting learning opportunities. However, they come with risks which educational institutions like us trust take care of. At Learners Note, we follow the Digital Child Protection policy to facilitate learning for your child at essential steps.

Internet
Technology Risks
Fraudulent
Risks
Privacy and
Security Risks
Cyber Crime
Risks
Caution

Online Risks for Children

Internet Technology Risk Consumer-Related Risks Information Privacy & Security
Content Risks Contact Risks Online Marketing Overspending Fraudulent Transactions Information Privacy Information Security
Illegal content Cybergrooming
Online
Child inappropriate or unsuitable products Impulse buying Online fraud Personal data collected from children Malicious code
Harmful content Harassment
• Cyber bullying
• Cyber stalking
Illegal and age-restricted products In-app purchases Online scams Oversharing Commercial spyware
Harmful advice Illegal interaction HFSS food and drinks Hidden costs Identity theft Unforeseen consequences Phishing attacks
Misinformation Unwanted contact Targeted advertising Subscription traps Payment fraud Long-term consequences Identity theft
Internet Technology Risk
Content Risks
  • Illegal content
  • Harmful content
  • Harmful advice
  • Misinformation
Contact Risks
  • Cybergrooming
  • Harassment (Cyber bullying, stalking)
  • Illegal interaction
  • Unwanted contact
Consumer-Related Risks
Online Marketing
  • Inappropriate products
  • Age-restricted products
  • HFSS food/drinks
  • Targeted advertising
Overspending
  • Impulse buying
  • In-app purchases
  • Hidden costs
  • Subscription traps
Fraudulent Transactions
  • Online fraud
  • Online scams
  • Identity theft
  • Payment fraud
Information Privacy & Security
Information Privacy
  • Personal data collection
  • Oversharing
  • Unforeseen consequences
  • Long-term consequences
Information Security
  • Malicious code
  • Commercial spyware
  • Phishing attacks
  • Identity theft