Children Need A Break

Mobile phones should be banned from the dinner table and bedtimes as part of a healthy approach to devices, the UK's four chief medical officers have said.

Children should also take a break from screen-based activities every two hours, the guidance said. They also said technology companies must do more to keep children safe.

The report comes as England's Health Secretary, Matt Hancock, is set to meet bosses at Instagram over the handling of self-harm and suicide content. Links have been made between the suicide of teenager Molly Russell and her exposure to harmful material on Instagram. Her father has said he believes the Facebook-owned platform "helped kill my daughter".

Prof Dame Sally Davies, England's chief medical officer and the lead for the UK, said the case was "tragic" and it was clear some children were being exposed to inappropriate content. She said companies had a duty of care to help keep children safe and that age limits for using social media needed to be properly enforced and children should not be channelled towards harmful content - one of the key concerns in the Molly Russell case.

But Dame Sally said a review of evidence had not proven a clear link between screen-based activities and mental health problems and digital technologies could be a force for good, aiding online learning, socialising and helping people manage health conditions.

The chief medical officers' guidance comes after leading pediatricians said last month that parents should worry less about screen use after a review found there was little evidence it was harmful in itself. What does the guidance recommend parents do?

There are several clear steps for parents, which the chief medical officers say will help keep children safe and healthy.

These include:

  • not using phones and mobile devices at the dinner table - talking as a family is very important for development
  • keeping screens out of the bedroom at bedtime
  • talking as a family about keeping safe online and about cyber-bulling and what children should do if they are worried
  • not using phones when crossing a road or doing any other activity that requires a person's full attention
  • making sure children take a break from screens every two hours by getting up and being active
  • policing their own use too - parents should give their children proper attention and quality family time and never assume they are happy for pictures to be shared

Is New Legislation Needed?

Dame Sally said a code of conduct was definitely needed.

She wants to see technology companies invest in systems that properly vet the ages of users - a number of platforms require users to be 13 but these were not properly policed, she said.The guidance is also critical of what it calls "persuasive design". This refers to techniques used to encourage addictive behaviour, including collecting likes and rewards for performing actions such as sharing pictures.

Dame Sally also wants social media companies to develop better algorithms that push positive content to users. This has already been done for users who search for content that could potentially radicalise them. Instead of being fed material that promotes terrorism, users get content that aims at de-radicalising them. Dame Sally said the same thing could happen when people searched for "self-harm" or "suicide".

"We would like to see content that promotes help-lines and where to go for support," she said. And she warned if industry did not act, ministers were likely to legislate to compel them.

"They need to sort themselves out - to safeguard our children," Dame Sally said.

"They have a duty of care - and if they don't, I expect the government will tell them how they will sort it."

Does regular use cause mental health problems?

The chief medical officer used a team of academics to scour the research done on this issue. The academics said that, while some research had pointed to an association between screen-based activities and negative effects such as an increased risk of anxiety and depression, it was still inconclusive. It could be just that people who struggled with mental health problems were more likely to turn to their devices, Dame Sally said, rather than their habits being the root cause of the problems.

Nonetheless, Dame Sally said, there needed to be a precautionary approach to this, until more research had been done - hence the guidance to parents. Dr Bernadka Dubicka, of the Royal College of Psychiatrists, said the medical officers were right to be cautious.

"We do not yet have enough evidence to draw a definite link between screen time and mental health problems - but it is clear that some of the content that young people are viewing online, such as pro-anorexia, suicide and self-harming content, can be incredibly harmful," she said.

BBC

You Might Also Read:

Child-Tracking Watches Are 'Easy to Hack':

« Unleash Blockchain Into Your Supply Chain
Cloud Based Technology For Policing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

CrashPlan

CrashPlan

CrashPlan delivers secure, continuous endpoint backup and recovery for businesses of all sizes.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.