PsychVault
HomeBrowseStoresBlogSell
AboutContactFAQFeedbackCareersTemplatesCategories
PsychVault

Discover and sell psychology resources that save time in real clinical work.

hello@psychvault.com.au
FacebookInstagramTikTokLinkedInYouTube

Browse

All resourcesCreator storesBlogTemplatesFree resourcesBest sellersTop rated

Creators

DashboardUploadStore

Support

ContactFAQFeedbackCareersPrivacy policyTerms of serviceRefund policy

Made in Australia for Australian psychologists and allied health professionals.

Handcrafted resources by practising clinicians for your practice.

© 2026 PsychVault · RSS · Sitemap

AHPRAExternalAPS AlignedExternalAAPI MemberExternal
Free Resources
Home/Blog/Online Safety in Australia: A Practical Guide to Social Media, Gaming, AI, Sextortion, and Cyberbullying
Parent, teenager, and clinician facing a wall of phones, game icons, chat bubbles, and warning symbols, with calm protective shapes cutting through the noise, Risograph editorial i
Digital Safetyonline safety AustraliaeSafetycyberbullying

Online Safety in Australia: A Practical Guide to Social Media, Gaming, AI, Sextortion, and Cyberbullying

A practical Australian guide to online safety for parents, young people, schools, and clinicians, covering eSafety reporting, under-16 social media rules, cyberbullying, sextortion, deepfakes, phishing, malware, gaming p

By Ethan Smith16 May 202631 min read6735 words
Share

Online safety in Australia is no longer just about screen time, stranger danger, or telling kids to put their phones away at dinner.

It now includes social media age restrictions, group chat abuse, sextortion, image-based abuse, deepfakes, phishing, malware, AI companions, gaming microtransactions, battle passes, grooming, privacy loss, and the way platforms are designed to keep people emotionally hooked.

For parents, schools, and clinicians, that can make the whole topic feel too broad to get your arms around. For young people, it can feel even worse. A problem may start as a joke, a flirtation, a private message, a "free skin" link, or a fake account. By the time an adult notices, the damage may already feel public, humiliating, and hard to reverse.

This guide pulls the Australian picture together in one place. It is grounded in eSafety guidance and current Australian rules, but it also goes further into the everyday harms people often underestimate: exclusion in group chats, emoji-coded bullying, currency distancing in games, battle-pass pressure, AI-generated sexual abuse, fake giveaways, hacked accounts, and the risks of treating chatbots like safe emotional support.

This article is general information only and is not legal, clinical, crisis, regulatory, or registration advice. If someone is in immediate danger, call 000. For urgent online harm, child exploitation concerns, or criminal offending, contact police and use the appropriate reporting pathway.

Who this guide is for

  • For parents and carers: start with What to do in the first 15 minutes, Australia's under-16 social media rules, Parental controls, monitoring software, and active oversight, and When to report to eSafety, police, ACCCE, ReportCyber or Scamwatch.
  • For schools: start with What cyberbullying looks like in practice, Sextortion and image-based abuse, Deepfakes and AI-generated sexual abuse, and Parent and school checklist.
  • For clinicians and youth workers: start with Red flags that someone may need help, AI safety for young people and families, AI in therapy and online mental health support, and When to report to eSafety, police, ACCCE, ReportCyber or Scamwatch.

Start here, then go deeper

If you want the shorter companion guides that sit underneath this pillar, start with the branch that matches the problem in front of you:

  • Australia's Under-16 Social Media Rules Explained
  • What Cyberbullying Looks Like Online in Australia
  • Sextortion, Deepfakes, and Image-Based Abuse in Australia
  • Gaming Microtransactions, Loot Boxes, and Battle Passes in Australia
  • Phishing, Malware, and Hacked Accounts: Online Safety for Australian Families
  • AI Safety for Young People, Families, and Clinicians in Australia
  • Parental Controls, Monitoring Software, and Online Safety in Australia
  • When to Report Online Harm in Australia: eSafety, Police, ACCCE, ReportCyber, or Scamwatch?

What to do in the first 15 minutes

If someone shows you something alarming online, the first fifteen minutes matter.

  1. 1Check immediate safety first. If there is a direct threat, stalking concern, child exploitation risk, or fear someone may act right now, call 000 or police.
  2. 2Slow the panic. A useful first line is: "You are not in trouble. We are going to handle this step by step."
  3. 3Preserve evidence if it is safe and lawful. Screenshot usernames, times, URLs, threats, payment requests, and surrounding context. Do not save or redistribute illegal sexual material involving minors.
  4. 4Stop further contact where appropriate. Mute, block, log out, or pause replies if the person is being pressured, blackmailed, or flooded.
  5. 5Do not pay, do not negotiate, and do not send more images if the issue is sextortion or blackmail.
  6. 6Work out the reporting path. Platform first for much cyberbullying and adult abuse, eSafety for image-based abuse, ACCCE or police for child sextortion, ReportCyber for hacking or malware, Scamwatch for scams.
  7. 7Bring in another adult if the target is a child or is highly distressed. These situations are easier to contain when one person is not carrying them alone.

For clinicians thinking about online contact through an ethics lens as well as a safety lens, Dual Relationships in Psychology: Where the Ethical Lines Actually Are is the closest companion article in the current blog cluster.


Jump to a section

  • What online safety means in Australia now
  • What eSafety can help with
  • What to do in the first 15 minutes
  • Australia's under-16 social media rules
  • What children under 16 can still use
  • Apps matter as much as social media
  • Location sharing, device tracking, and tech-enabled control
  • Why the design of platforms matters
  • What cyberbullying looks like in practice
  • Sextortion and image-based abuse
  • Deepfakes and AI-generated sexual abuse
  • Gaming risks: currency distancing, loot boxes, battle passes and more
  • Phishing, malware, trojans and account theft
  • AI safety for young people and families
  • AI in therapy and online mental health support
  • Age-based practical guidance
  • What parents and carers can do
  • Parental controls, monitoring software, and active oversight
  • Parent and school checklist
  • What schools should be ready for
  • When to report to eSafety, police, ACCCE, ReportCyber or Scamwatch
  • Red flags that someone may need help
  • FAQ

Parent, teenager, and clinician facing a wall of phones, game icons, chat bubbles, and warning symbols, with calm protective shapes cutting through the noise, Risograph editorial illustration in terracotta and charcoal on warm cream
Online safety is now a social, emotional, financial, and legal issue all at once

What online safety means in Australia now

The old model of online safety was narrower. It focused on obvious threats like strangers, explicit content, and "don't share your address".

That advice still matters. It is just no longer enough.

The modern online risk picture includes:

  • bullying that happens through exclusion, screenshots, fake accounts, and pile-ons rather than direct threats
  • sexual abuse and coercion that starts in private messages, games, dating apps, or "friendship" accounts
  • AI-generated deepfakes, voice clones, and fake evidence
  • gaming systems designed to normalise spending, urgency, scarcity, and status competition
  • scams aimed at children through skins, gift cards, fake giveaways, and compromised friend accounts
  • emotional over-reliance on AI companions or chatbots
  • privacy loss when personal or health information is entered into online tools
  • pressure to be always available, always responsive, always visible

In Australia, the eSafety Commissioner is the main national regulator for serious online harms. That makes eSafety a central practical reference point for this topic, especially when harmful content needs to be reported or removed.

What eSafety can help with

eSafety helps Australians deal with serious online abuse and harmful content. That includes different reporting pathways depending on the kind of harm involved.

Broadly, eSafety can help with:

  • cyberbullying of a child or young person under 18
  • adult cyber abuse
  • image-based abuse, including threats to share intimate images or videos
  • illegal and restricted online content

That content can appear in many forms:

  • posts
  • comments
  • messages
  • chats
  • livestreams
  • memes
  • emails
  • images
  • videos
  • online games
  • forums
  • websites

For cyberbullying of a child or for adult cyber abuse, eSafety generally expects the harmful content to be reported to the platform first. For image-based abuse, eSafety can often be approached more directly. For illegal content, serious threats, or criminal conduct, police or other reporting pathways may also be needed.

The key practical point is this: online harm is not "less real" because it happened on a screen. Australian systems increasingly treat it as real harm with real pathways for action.

Australia's under-16 social media rules

Australia's social media age restrictions are now part of the online safety landscape and parents need to understand them clearly.

As of 10 December 2025, age-restricted social media platforms must take reasonable steps to prevent Australians under 16 from creating or keeping accounts. According to eSafety's current guidance, the main platforms required to do this include:

  • Facebook
  • Instagram
  • Kick
  • Reddit
  • Snapchat
  • Threads
  • TikTok
  • Twitch
  • X
  • YouTube

eSafety also lists some services that have self-assessed as age-restricted for Australian users, including:

  • BigoLive
  • BlueSky
  • Lemon8
  • Wizz
  • Yubo

Under the Australian framework, the legal obligation sits with platforms, not with children or parents. Under-16s do not commit an offence by having an account, and their parents or carers do not commit an offence either. Platforms can face civil penalties if they fail to take reasonable steps to comply.

Under-16s are still allowed to view publicly available content that does not require a logged-in account.

These platform lists can change over time if services evolve or eSafety reassesses them, so it is worth checking the latest official list rather than relying on screenshots or parent-group summaries.

That distinction matters because many young people will still encounter trends, videos, harassment, extremist content, beauty standards, scams, and sexualised material through public viewing, screenshots, reposts, group chats, gaming communities, or older peers' accounts.

What children under 16 can still use

One of the biggest sources of confusion is the assumption that "under-16 social media restrictions" means "kids cannot use anything social online". That is not what the current Australian framework says.

As at eSafety's latest published view, under-16s can still have accounts on many services whose main purpose is messaging, gaming, education, or specific child-focused functions.

Examples eSafety currently says are not age-restricted social media platforms include:

  • Discord
  • GitHub
  • Google Classroom
  • LEGO Play
  • Messenger
  • Pinterest
  • Roblox
  • Steam and Steam Chat
  • WhatsApp
  • YouTube Kids

That does not mean these services are risk-free.

It means they are not currently captured by this specific social media law. A child can still be bullied on a messaging app, pressured on Discord, groomed in a game, scammed through Steam, or exposed to harmful chat in Roblox.

For families, the better question is not just "is this legal for my child to use?" It is also:

  • What can they do on it?
  • Who can contact them?
  • Can strangers message them?
  • Can it be linked to voice chat?
  • Does it include spending?
  • Are there private servers, group chats, or livestreams?
  • Does it reward constant engagement?
Teen silhouette between approved and age-restricted platform icons, with gates, open pathways, and caution markers, Risograph editorial illustration in dusty blue and charcoal on warm cream
Not age-restricted does not mean automatically low-risk

Apps matter as much as social media

One of the easiest mistakes for adults to make now is thinking in categories that no longer reflect how young people actually use the internet.

A child may say:

  • "It's not social media, it's just Discord."
  • "It's just Roblox."
  • "It's only a group chat."
  • "It's just Twitch."
  • "It's only an AI app."

Functionally, though, many apps now blend together:

  • messaging
  • livestreaming
  • voice chat
  • group servers
  • private calls
  • image sharing
  • in-app purchases
  • public discovery
  • creator culture
  • recommendation feeds

That means an app can act like social media, gaming, chat, streaming, and a marketplace all at once.

For parents, it helps to think less in terms of brand names and more in terms of features.

Features that deserve a second look

FeatureWhy it matters
Private messagingMakes grooming, bullying, blackmail, and pressure easier to hide
Voice chatCan expose children to adult language, coercion, harassment, or rapid trust-building
Group servers or group chatsCan scale exclusion, dogpiling, and screenshot abuse very quickly
LivestreamingIncreases exposure to public comments, gifting pressure, sexualised interactions, and parasocial attachment
Location sharingCan expose routine, school, suburb, or movement patterns
In-app browserCan be used to bypass some device-level safety limits
File sharingMakes it easier to move images, links, and explicit content between people
Gifting systemsCan be used to build loyalty, obligation, or a sense of debt
Public discoverabilityMakes it easier for strangers to find, add, follow, or contact a child
Linked accountsOne app can open the door to others, especially when gaming, streaming, and chat services are connected

This is why "What app is it?" is only the first question.

The better follow-up questions are:

  • Can strangers contact my child there?
  • Can they be added to group spaces?
  • Does it support voice or video?
  • Does it have gifting, coins, or subscriptions?
  • Does it push people toward private chat?
  • Does it include a browser, links, or file sharing?
  • Can my child livestream from it, or be pushed off-platform from it?
Layered collage of chat apps, game controllers, live stream windows, gift icons, and hidden private-message tunnels, Risograph editorial illustration in teal and charcoal on warm cream
The risk often sits in the feature mix, not the app label

Location sharing, device tracking, and tech-enabled control

One of the biggest modern safety gaps is treating location tools as neutral convenience features.

In practice, location sharing can become a stalking, coercive-control, or peer-monitoring problem very quickly. eSafety warns that tracking can happen through apps, linked accounts, phones, watches, fitness devices, and small Bluetooth trackers.

Common pathways include:

  • Snapchat location features and similar live-map tools
  • Find My, Google location sharing, and family-location apps
  • shared Apple or Google accounts
  • saved logins, shared passwords, and synced browsers
  • AirTags and other Bluetooth trackers hidden in bags, cars, prams, or clothing
  • abusive partners, peers, or family members using device access to monitor movement

Red flags include:

  • "My parent, partner, or friend always knows where I am."
  • being pressured to keep location sharing on at all times
  • panic when someone cannot account for a person's whereabouts immediately
  • unexplained knowledge of routines, visits, or routes
  • concern that turning off tracking will trigger conflict or retaliation

This matters in family violence, stalking, coercive control, and teen relationship abuse. It also matters in ordinary school contexts, where a location-sharing tool can slide into monitoring, pressure, and punishment disguised as care.

If tracking is suspected, think carefully before changing settings in a way that may alert the person using the tool. Safety planning, police advice, and domestic or family violence support may be more appropriate than a quick technical fix.

Why the design of platforms matters

Many parents still think online safety is mostly about content choice and self-control. The harder truth is that many platforms are built to reduce self-control.

The risk is not only what a child goes looking for. It is what the platform does to hold their attention, shape their mood, and change their behaviour.

Design features that matter include:

  • infinite scroll
  • autoplay
  • streaks
  • disappearing stories
  • algorithmic "For You" feeds
  • constant notifications
  • private messages
  • public follower counts
  • beauty filters
  • reaction counts
  • livestream gifting
  • recommendation loops

These features can amplify:

  • sleep disruption
  • social comparison
  • compulsive checking
  • humiliation after conflict
  • pressure to reply immediately
  • exposure to harmful or sexualised content
  • fear of missing out

This same design logic also appears in games, AI companions, and some messaging platforms. Once you start seeing it as a behaviour-shaping system rather than just "content", a lot of young people's reactions make more sense.

What cyberbullying looks like in practice

Cyberbullying is often misunderstood because adults look for obvious cruelty and miss the social mechanics around it.

eSafety's own examples include hurtful messages, embarrassing images, gossip, exclusion, fake accounts, and tricking someone by pretending to be someone else. In real school and peer-group life, it often looks even messier and more coded than that.

Here are some common patterns.

BehaviourWhat it can look like
Public humiliationPosting screenshots, private photos, jokes, edits, or "receipts" designed to embarrass someone
DogpilingA group repeatedly comments, reacts, mocks, or messages one person
ExclusionLeaving someone out of group chats, events, tags, or inside jokes on purpose
Indirect postingVague posts clearly aimed at one person without naming them
Emoji-coded bullyingUsing emojis as a sneer, sexual suggestion, threat, or group signal for mockery
Fake accountsImpersonating someone to embarrass them or stir conflict
Screenshot abuseTaking private chat content and redistributing it publicly or to wider groups
Ranking culture"Rate them", "who is hottest", "who is most annoying", or poll-based humiliation
Ghosting as punishmentA deliberate sudden withdrawal used to create panic, shame, or social instability
Love bombingFlooding someone with attention early to build dependency, loyalty, or pressure
Reactive set-upsProvoking someone privately, then posting their reaction publicly
Group chat controlRemoving and re-adding someone, renaming chats, muting them, or using seen-status to shame them

Emoji bullying is real

Adults often dismiss emoji use because it looks trivial. It is not trivial when the meaning is shared by the group using it.

A single emoji can communicate:

  • "everyone is laughing at you"
  • "you are being watched"
  • "you are sexually available"
  • "we are excluding you"
  • "this is a threat dressed up as a joke"

Meaning comes from context, repetition, timing, and who else joins in.

Exclusion is not always passive

Being left out online is often framed as unfortunate but not abusive. In practice, deliberate exclusion can be one of the most psychologically powerful forms of bullying, especially for children and teenagers whose social life is organised through group chats, streaks, snaps, Discord servers, or school-related messaging.

Love bombing and ghosting can become coercive

Not every intense crush, awkward withdrawal, or messy teen interaction is abuse.

But eSafety explicitly warns that love bombing can be part of coercive control when someone uses over-the-top affection to create a strong emotional bond and then leverage that bond to manipulate, pressure, monitor, or sexualise the other person. Ghosting can also become part of a control pattern when it is used strategically to destabilise someone, punish them, or push them into compliance.

For parents and schools, the safest frame is not "kids are dramatic online". It is "relationship behaviour online can become controlling, humiliating, and coercive very quickly".

Sextortion and image-based abuse

Sextortion is a form of blackmail. eSafety describes it as threatening to share a nude or sexual image or video unless the person gives in to demands.

Those demands may involve:

  • money
  • more sexual images
  • sexual acts on live video
  • gift cards
  • account access
  • silence

This often starts with catfishing, flirting, or rapid intimacy. The offender may pose as an attractive peer, a romantic interest, or a person wanting to move quickly into sexual conversation. They may record a live chat, encourage a nude exchange, or pretend to have hacked a device.

Common targets include:

  • teenagers
  • young adults
  • boys who have never imagined they would be targeted
  • adults using dating apps
  • people who are isolated, lonely, ashamed, or scared of judgment

eSafety's core advice is practical:

  • stop contact
  • do not pay
  • do not send more images
  • tell someone you trust
  • report it

If the person is under 18 and being blackmailed with sexual images, eSafety points people toward the Australian Centre to Counter Child Exploitation (ACCCE) as the best reporting pathway. If intimate content is shared online, eSafety may also be able to help remove it.

The most important message for young people is simple: being targeted does not make it your fault. Shame is one of the blackmailer's main tools.

Families, schools, and clinicians should also be careful not to investigate by forwarding, saving, or redistributing sexual images involving minors. If sexual material involving a child or teenager may be involved, seek advice from police, ACCCE, or eSafety rather than trying to "collect proof" in a way that creates further legal or safeguarding risk.

Deepfakes and AI-generated sexual abuse

Deepfakes are no longer a niche tech problem. eSafety defines a deepfake as a realistic but false digital photo, video, or sound file of a real person created using AI.

That matters because deepfakes can now be used for:

  • fake pornography
  • fake nudes of students
  • humiliation after rejection
  • extortion
  • identity theft
  • reputational sabotage
  • blackmail
  • hoaxes
  • manipulated "evidence"

eSafety also makes clear that image-based abuse includes intimate images that have been digitally altered, including deepfakes.

In school and youth settings, one of the most serious emerging harms is the use of "nudify" apps or image-editing tools to create fake explicit images from ordinary photos. Students sometimes talk about this as a joke, a prank, or "not real". The harm is still real.

The target may experience:

  • humiliation
  • panic
  • fear about who has seen it
  • sexualisation
  • loss of trust
  • school refusal
  • social isolation

It may also trigger:

  • school discipline processes
  • police reporting
  • image-based abuse pathways
  • child safety responses

Deepfakes are also not limited to sexual content. Voice cloning, fake apology clips, fake admissions, and AI-generated screenshots can all be used to intensify bullying or social manipulation.

The same evidence caution applies here. If a deepfake or explicit image appears to involve a minor, do not forward it around a parent group, staff chat, or friendship group to prove it exists. Get advice from police, ACCCE, or eSafety and preserve only what is safe and lawful to preserve.

School corridor abstracted into a collage of altered portraits, AI masks, and cracked screens, Risograph editorial illustration in indigo and charcoal on warm cream
A fake image can still create very real damage

Gaming risks: currency distancing, loot boxes, battle passes and more

Gaming can be fun, social, creative, and regulating. eSafety emphasises that many children and teens have positive online gaming experiences.

The point is not that gaming is bad.

The point is that modern online games often combine:

  • social interaction
  • spending
  • scarcity
  • status display
  • persuasive design
  • private contact
  • algorithmic retention

That creates a different kind of risk picture from older offline gaming.

Microtransactions

Microtransactions are small purchases made inside a game. They can buy:

  • skins
  • emotes
  • boosts
  • characters
  • access passes
  • tokens
  • ad removal
  • extra lives
  • random rewards

eSafety notes that many games let players buy extras like avatar customisation, removing ads or wait times, and loot boxes that generate random rewards.

The problem is not just the existence of spending. It is how spending is framed.

Currency distancing

Currency distancing is when a game inserts a fictional currency between the player and real money.

Instead of thinking:

I spent $14.99

the player experiences:

I only used 1,200 gems

That psychological distance matters. It makes spending feel less concrete, especially when:

  • bundles are sold in awkward amounts
  • leftover currency remains after a purchase
  • the item price is designed not to match the purchase bundle neatly
  • clicking to buy is frictionless

eSafety explicitly notes that in-game currency can make it harder to see how much money is actually being spent.

Loot boxes and loot crates

Loot boxes, crates, cases, and bundles are random reward systems. eSafety describes them as purchases where you pay without knowing the value of what is inside, more like a lucky dip than a standard purchase.

In Australia, game classification rules changed on 22 September 2024:

  • games with in-game purchases linked to chance, such as paid loot boxes, are classified at least M
  • games with simulated gambling are classified at least R 18+

That matters for parents because it shifts loot boxes out of the "harmless game extra" category and closer to a gambling-like concern. It is also important to understand that M is advisory rather than a legal age ban, while R 18+ is a legal adult restriction.

Classification helps parents identify risk, but it does not necessarily remove gambling-like mechanics from games children can still access, especially across older classifications, mobile games, web games, third-party marketplaces, and overseas platforms.

Battle passes

Battle passes are time-limited reward tracks. They often combine:

  • daily log-in pressure
  • weekly tasks
  • FOMO
  • exclusive cosmetic rewards
  • social comparison
  • sunk-cost thinking

A child who has paid for a battle pass may feel they now have to keep playing or they will "waste" the money. That can drive repetitive play even when the game has stopped being enjoyable.

Skins and social status

Skins and cosmetic items may be framed as harmless because they do not always affect gameplay. Socially, though, they can matter a lot.

In some peer groups, cosmetics become markers of:

  • belonging
  • status
  • being "up to date"
  • access to spending
  • identity

That can create real social pressure, especially in younger players who do not yet understand how deliberately these systems are designed.

Other gaming risks families underestimate

Parents often focus on violence ratings and miss the wider ecosystem:

  • voice chat with strangers
  • private messaging
  • grooming through gifts or flattery
  • being added to Discord or off-platform servers
  • fake giveaways
  • account theft
  • third-party trading sites
  • gambling-like skin markets
  • pressure to stream or perform

Phishing, malware, trojans and account theft

Online safety also includes basic cyber security.

The Australian Cyber Security Centre advises people to be suspicious of unsolicited messages, avoid clicking links or downloading files from people they do not know, and check requests through official channels rather than message links.

Children are often targeted through things they care about:

  • free Robux
  • free skins
  • "your account will be banned"
  • leaked photos
  • influencer giveaways
  • fake event tickets
  • hacked friend accounts

Here is the practical difference between a few common threats.

ThreatWhat it means
PhishingFake emails, messages, or websites designed to steal passwords, money, or personal information
SmishingPhishing sent by text message or messaging app
MalwareHarmful software that can spy on activity, damage a device, or steal information
TrojanMalware disguised as something useful or legitimate, like a game mod, cracked file, or update
Account takeoverSomeone gets into an account and uses it to scam others, impersonate the user, or access saved information
Credential stuffingReusing stolen passwords from one site to access accounts on other sites
QR scamsQR codes that redirect to fake logins, fake payments, or harmful downloads

If malware may have been installed, the ACSC advises running antivirus or a security scan and reporting the incident to ReportCyber if appropriate.

A strong family rule helps a lot:

Do not enter passwords, payment details, codes, or personal information after clicking a link in a message. Go to the official app or website directly.

AI safety for young people and families

AI is now part of ordinary online life.

Young people may use AI for:

  • homework
  • image generation
  • advice
  • entertainment
  • flirting
  • emotional support
  • roleplay
  • brainstorming
  • self-diagnosis

Some AI tools are general assistants. Others are built to feel like companions, partners, mentors, or therapists.

eSafety has warned about the risks of AI companions, especially for children and young people. These tools can create highly personalised, emotionally sticky interactions and may expose young people to sexual content, manipulative framing, dependency, or privacy risks.

Risks include:

  • false confidence in inaccurate advice
  • entering deeply personal information into a public or poorly governed system
  • sexualised or coercive chatbot behaviour
  • the chatbot reinforcing unsafe beliefs
  • the chatbot responding convincingly to distress, self-harm, abuse, or coercion disclosures without reliable safeguarding duties, crisis escalation, identity verification, or local reporting pathways
  • bullying if peers discover the relationship with an AI companion
  • emotional over-reliance on something that sounds caring but is not accountable

The core message for families should be:

AI can be useful. It is not a trusted adult, not a therapist, not a lawyer, and not an emergency service.

AI in therapy and online mental health support

This matters for clinicians, parents, and young people alike.

Some mental health-adjacent tools now market themselves as:

  • therapy support
  • wellness coaching
  • journaling companions
  • AI listeners
  • mental health chatbots
  • note-taking tools
  • automated scribes

Some can be helpful in narrow ways. The risk is that people assume "sounds empathic" means "safe clinical care".

Ahpra's guidance on AI in healthcare says practitioners remain responsible for safe and quality care regardless of what technology they use. It also emphasises accountability, human judgment, transparency, informed consent, confidentiality, privacy, and checking the accuracy of AI-generated records.

That means a therapist or health practitioner should be cautious about:

  • putting identifiable client information into public AI tools
  • relying on AI summaries without review
  • using AI output as if it were clinical judgment
  • recording or transcribing sessions without proper consent
  • overlooking where data is stored and whether it may be disclosed outside Australia

The OAIC also states that the Privacy Act applies to uses of AI involving personal information, including commercially available AI products and publicly accessible chatbots.

For clients and families, the practical questions are:

  • Is this tool clearly an AI tool?
  • What happens to the information entered?
  • Is anyone accountable if it gives harmful advice?
  • Can it escalate risk or crisis concerns safely?
  • Is it replacing a practitioner or just supporting them?

For clinicians, the practical rule is stricter:

Do not treat convenience as consent, and do not treat automation as clinical accountability.

If you are thinking about how values, language, and documentation choices shape care for autistic and otherwise neurodivergent young people, What Are Neuroaffirming Templates — And Why Do They Look Different From Standard Clinical Resources? is the most relevant companion piece.

Age-based practical guidance

This is a broad Australian guide. It is not a substitute for checking each platform's current rules and your child's specific needs.

AgePractical focus
Under 5Very close supervision, parent-set content choices, no unsupervised messaging or uploads
5 to 10Basic cyber safety, privacy, links, scams, kindness, asking for help, and strong parental controls
10 to 12More explicit teaching about bullying, screenshots, spending, fake accounts, gaming chat, and social pressure
13 to 15Age-restricted platforms must take reasonable steps to prevent Australians under 16 from having accounts; focus on safer messaging, gaming, education tools, and decision-making skills
16 to 17Gradual independence with active teaching about consent, reputation, scams, privacy, sexual coercion, AI, and reporting tools
18+Adult legal access does not remove risk; adult cyber abuse, image-based abuse, scams, coercive control, and deepfakes still matter

The mistake adults often make is treating a birthday as a safety switch.

Turning 16 does not automatically create judgment, boundaries, emotional regulation, or scam resistance. Those still need to be taught, modelled, and practised.

What parents and carers can do

Parents do not need to become surveillance officers. They do need a plan.

The most useful family online safety practices are usually the least glamorous:

Build a no-shame reporting culture

Children need to know they can tell you if they:

  • clicked the wrong link
  • sent something sexual
  • spent money in a game
  • got threatened
  • made a mistake

If the expected response is rage, humiliation, or instant device confiscation, many children will hide the problem until it escalates.

Use payment controls

  • remove saved cards where possible
  • require approvals for purchases
  • use gift cards or capped funds if spending is allowed
  • turn on console and app-store parental controls

Review privacy and contact settings

Check:

  • who can message them
  • whether strangers can add them
  • whether location sharing is on
  • whether group invites are open
  • whether friend lists are public

Also check for:

  • shared account access
  • saved passwords on shared devices
  • connected watches, tags, or other tracking devices
  • family-location tools that no longer feel safe or appropriate

Talk about the social side, not just the technical side

Ask about:

  • group chats
  • who makes them feel stressed online
  • whether anyone pressures them to reply immediately
  • whether people share screenshots
  • what would happen if a friendship went bad

Screenshot before deleting, when safe

Evidence matters. eSafety repeatedly advises collecting evidence before reporting, while being careful not to save illegal sexual material involving minors. If the material may involve a child or teenager, do not try to investigate it yourself by downloading, forwarding, or storing copies unnecessarily.

Help them practise scripts

Children often know a situation feels wrong but do not know what to say.

Useful scripts include:

  • "I'm not comfortable with that."
  • "Don't send me that again."
  • "I'm logging off now."
  • "I need to check with my parent."
  • "I'm not clicking that."

Keep the door open after the immediate crisis

The first disclosure is not the end of the story. Shame, retaliation, school dynamics, and social fallout often continue after the post or image is removed.

For clinicians or school-based practitioners who need practical follow-up tools, Psychology Resources Australia, Practical psychology templates for therapy, assessment, and NDIS work, and How to make psychoeducation handouts clinician-friendly are the best starting points in the broader PsychVault library.

Parental controls, monitoring software, and active oversight

Parents often get pulled toward two extremes:

  • doing almost nothing because they do not want to invade privacy
  • installing heavy monitoring software and hoping the software will do the parenting

Neither extreme works especially well on its own.

eSafety's current guidance is more balanced than that. Parental controls can help, but they work best when combined with conversations, shared expectations, active oversight, and settings that are reviewed over time.

What parental controls can do well

Depending on the device, platform, or account, parental controls may help you:

  • set screen-time limits
  • block or restrict apps
  • turn off in-app purchases
  • manage who can contact your child
  • limit explicit content
  • restrict downloads
  • control privacy permissions
  • block websites or categories of websites
  • limit communication features in games

Some examples eSafety points families toward include:

  • Apple Screen Time, Family Sharing, and Communication Safety
  • Google Family Link and Google Play parental controls
  • Microsoft Family
  • parental controls on Xbox, PlayStation, Nintendo, Steam, and other platforms
  • Discord Family Centre

What they do not do well

Parental controls do not reliably:

  • teach judgment
  • prevent all bullying
  • stop private humiliation once a screenshot exists
  • make a risky app safe by default
  • detect emotional coercion
  • replace conversations about sex, consent, money, and pressure

They also do not cover every environment equally well. eSafety notes that mobile and browser-based games often have fewer built-in safety controls than major consoles, which means parents may need to rely more on device settings, supervision, and app-specific checks.

Monitoring software: useful, but not magic

Monitoring software can include:

  • screen-time dashboards
  • app-use reports
  • purchase approvals
  • content filters
  • browsing reports
  • location sharing
  • communication summaries

Used carefully, these tools can help parents notice patterns early.

They can be especially useful when:

  • a child is younger
  • a device is newly introduced
  • spending is a concern
  • there has already been unsafe contact
  • a young person is vulnerable to impulsive downloading, scam links, or sexual pressure

But there are trade-offs.

Over-monitoring can:

  • drive secrecy
  • damage trust
  • push activity onto secondary devices or friends' devices
  • teach evasion rather than safety
  • make a young person less likely to disclose when something genuinely goes wrong

The best use of monitoring tools is usually transparent rather than covert. eSafety's own parent guidance encourages adults to be upfront with children about the controls being used and to review them as the child grows and shows responsible behaviour.

Ways children bypass controls that parents often miss

eSafety's parental-controls summary sheet highlights several common workarounds:

  • using in-app browsers inside games or messaging apps
  • deleting and reinstalling apps to reset some restrictions
  • using web versions of apps rather than the installed version
  • using phone data instead of family wi-fi
  • using updates or resets that undo settings
  • moving files directly between devices

This is one reason a purely technical approach fails. Children do not need to be "bad at tech" to get around a settings-based system. Often they just need curiosity, a bored afternoon, or a friend's suggestion.

A practical approach that tends to work better

  1. 1Set age-appropriate controls on the device, account, and app.
  2. 2Explain what is being monitored and why.
  3. 3Focus first on contact, spending, downloads, and privacy.
  4. 4Review settings after updates, new devices, or new apps.
  5. 5Adjust the level of oversight as your child demonstrates judgment.
  6. 6Keep asking about what feels stressful, exciting, embarrassing, or confusing online.

The goal is not perfect control.

It is to make risky behaviour harder, support-seeking easier, and family trust strong enough that controls are not the only safety system in the house.

Parent and child reviewing settings on a phone, router, console, and laptop while transparent guardrails and bypass arrows appear around them, Risograph editorial illustration in olive green and charcoal on warm cream
Parental controls work best as part of an active relationship, not as a silent substitute for one

Parent and school checklist

If you want something you can copy into a note, parent handout, school wellbeing document, or staff briefing, start here.

Parent checklist

  • [ ] I know which apps, games, chat spaces, and devices my child uses most
  • [ ] I understand which of those apps allow private messages, voice chat, livestreaming, and spending
  • [ ] Age-restricted social media accounts have been checked against the current Australian rules
  • [ ] Payment methods are removed, capped, or protected by approval settings
  • [ ] Privacy settings, location sharing, and public discoverability have been reviewed
  • [ ] My child knows they can tell me about threats, scams, sextortion, or mistakes without being shamed
  • [ ] We have talked about screenshots, group chat exclusion, fake accounts, and image-sharing pressure
  • [ ] We have talked about AI tools, including why chatbots are not therapists or emergency services
  • [ ] I know the difference between platform reporting, eSafety, ACCCE, ReportCyber, and Scamwatch
  • [ ] I would know how to preserve evidence without escalating harm

School checklist

  • [ ] The school has a clear process for cyberbullying reports
  • [ ] The school has a clear process for image-based abuse and sextortion disclosures
  • [ ] Staff know what to do if a student reports a fake nude or AI-generated image
  • [ ] Staff know when to escalate to police, child protection, eSafety, or ACCCE
  • [ ] The school can guide families on evidence collection without telling students to spread or retain illegal sexual material
  • [ ] Student wellbeing staff understand that exclusion, ghosting, ranking culture, and screenshot abuse can be serious bullying
  • [ ] Staff know that online incidents after hours may still affect school safety and functioning
  • [ ] Families are given a clear contact point rather than being bounced between staff
  • [ ] The school has thought about gaming-related harassment, anonymous pages, and off-platform group chats
  • [ ] The school response avoids blaming the targeted student for disclosing

Clinician and youth-work checklist

  • [ ] I ask directly about apps, games, group chats, and AI tools rather than asking only about social media
  • [ ] I assess online harm as part of risk, shame, sleep, friendship stress, and school-refusal presentations
  • [ ] I document online incidents clearly, neutrally, and without minimising coded bullying behaviours
  • [ ] I know the external reporting options well enough to guide a family toward the right next step
  • [ ] I avoid overstating what a platform, school, or regulator can definitely do
  • [ ] I pay attention to neurodivergence, communication differences, and power dynamics when discussing online incidents

If you want a school and developmental lens on youth wellbeing systems more broadly, Educational and Developmental Psychology in Australia is the closest companion article in the current blog cluster.

What schools should be ready for

Schools should stop treating online harm as "not our issue because it happened after school".

In reality, many online incidents affect:

  • attendance
  • concentration
  • classroom behaviour
  • peer relationships
  • school refusal
  • staff safety
  • community trust

At minimum, schools should have clear internal processes for:

  • cyberbullying
  • group chat abuse
  • sextortion disclosures
  • image-based abuse
  • AI-generated fake nudes
  • impersonation accounts
  • anonymous confession pages
  • gaming-related harassment
  • evidence handling
  • parent communication
  • police and child protection escalation

They also need a response culture that does not accidentally punish the target for disclosing.

That means avoiding reflexive responses like:

  • "just stay off your phone"
  • "why did you send it"
  • "it was only a joke"
  • "we can't do anything because it happened at home"

When to report to eSafety, police, ACCCE, ReportCyber or Scamwatch

Different harms need different pathways.

What this guide does not cover: This guide does not replace legal advice, school policy, mandatory reporting obligations, clinical risk assessment, or police advice in emergencies.
SituationBest first pathway
Child cyberbullying on a platform, app, or gameReport to the platform first, then to eSafety if serious and unresolved
Adult cyber abuseReport to the platform first, then to eSafety if serious and unresolved
Image-based abuse without blackmaileSafety can be approached directly
Sextortion involving a child or teenagerACCCE / police urgently; also preserve evidence and seek support
Intimate image shared onlinePlatform reporting plus eSafety removal pathway
Malware, hacking, cybercrime, account compromise with criminal elementsReportCyber
Scam losses or scam attemptsScamwatch, plus bank/platform where relevant
Immediate physical danger, threats, stalking, child exploitation concernsPolice / 000 in emergencies

The sequence matters less than making sure the person is safe, supported, and not left handling it alone.

Red flags that someone may need help

Online harm does not always announce itself clearly.

A child, teenager, or adult may need help if they:

  • panic when notifications appear
  • become distressed after gaming or messaging
  • suddenly hide screens
  • stop wanting to attend school
  • become preoccupied with money, gift cards, or account recovery
  • mention a threatening online relationship
  • talk about leaked images
  • seem ashamed, trapped, or unusually secretive
  • delete accounts suddenly
  • stop sleeping properly
  • withdraw from friends or activities

A strong first response is:

"You're not in trouble. Show me what happened and we'll work out the next step together."

FAQ

Can eSafety help if the child is under 16 and the harm happened on an age-restricted social media platform?

Yes. eSafety's published guidance is clear that under-16s should still report harm. The child is not the one in legal trouble.

Does "not age-restricted" mean a platform is safe for children?

No. It only means it is not currently captured by that specific social media restriction framework.

Are loot boxes illegal for children in Australia?

Not in the simple sense many parents assume. But Australian classifications changed in September 2024, and games with paid chance-based purchases now attract stronger classification treatment. That should be treated as a meaningful warning sign.

Is a fake nude still serious if it is AI-generated?

Yes. The image may be fake, but the humiliation, sexualisation, fear, and reputational harm are real.

Should parents immediately take the phone away?

Usually no. Immediate confiscation can shut down disclosure and destroy trust. Safety steps may include restricting use for a period, but the first priority is support, evidence, and the right reporting pathway.

Can AI be used safely in therapy?

Sometimes, but only with strong privacy, consent, governance, and human oversight. Public chatbots are not a safe default place for identifiable client information.

The practical takeaway

Online safety in Australia is now a mix of law, design, psychology, cyber security, and relationship literacy.

Families do not need to become experts in every platform. They do need to understand the core patterns:

  • where contact happens
  • where spending happens
  • where secrecy grows
  • where shame is used as leverage
  • where AI blurs what is real

eSafety should be treated as a major Australian anchor point for help. But the protective work usually happens earlier, in ordinary conversations about group chats, fake accounts, gaming purchases, private images, pressure, privacy, and what to do when something feels off.

The goal is not to raise children who are frightened of the internet.

It is to raise children, and support adults, who know what harm looks like, know they can ask for help, and know that online problems deserve calm, practical action rather than secrecy and panic.

Read next in this cluster

  • Australia's Under-16 Social Media Rules Explained
  • What Cyberbullying Looks Like Online in Australia
  • Sextortion, Deepfakes, and Image-Based Abuse in Australia
  • Gaming Microtransactions, Loot Boxes, and Battle Passes in Australia
  • Phishing, Malware, and Hacked Accounts: Online Safety for Australian Families
  • AI Safety for Young People, Families, and Clinicians in Australia
  • Parental Controls, Monitoring Software, and Online Safety in Australia
  • When to Report Online Harm in Australia: eSafety, Police, ACCCE, ReportCyber, or Scamwatch?

Support and official resources

  • eSafety Commissioner
  • Social media age restrictions information
  • How to report serious online abuse or illegal content
  • Report image-based abuse
  • Deal with sextortion
  • Gaming guidance for parents
  • How to manage money in games
  • Australian Cyber Security Centre
  • ReportCyber
  • Scamwatch
  • ACCCE
  • OAIC guidance on AI and privacy
  • Ahpra guidance on AI in healthcare
  • Kids Helpline
  • 1800RESPECT
  • Lifeline

Discussion

Share your thoughts and experiences with this resource.

Sign in to leave a comment

Comments

Next step

Browse real clinician-designed resources

Move from strategy into implementation with templates, handouts, and psychoeducation tools already live on the marketplace.

For creators

Turn your own resources into a polished store

Publish clinician-grade templates, build trust signals, and start growing an evergreen library under your own brand.

Related reading

Keep the topic cluster growing

Young person and clinician facing a glowing chatbot interface surrounded by privacy fragments and care boundaries, Risograph editorial illustration in violet and charcoal on warm c
Digital Safety
17 May 2026 / 3 min read

AI Safety for Young People, Families, and Clinicians in Australia

A practical Australian guide to AI companions, chatbots, privacy, deepfakes, emotional dependence, and the risks of using AI for support, advice, or therapy-adjacent care.

AI safety AustraliaAI companions young peoplechatbot mental health
By Ethan Smith
Read article
Teen silhouette standing between platform icons, age gates, and open pathways, Risograph editorial illustration in dusty blue and charcoal on warm cream, 16:10 landscape
Digital Safety
17 May 2026 / 5 min read

Australia's Under-16 Social Media Rules Explained: What Parents, Schools, and Clinicians Need to Know

A practical Australian guide to the under-16 social media rules, what platforms are age-restricted, what children can still use, where parents get confused, and what schools and clinicians should say about it.

under 16 social media AustraliaeSafety social media rulesparents social media law Australia
By Ethan Smith
Read article
Game controller, coins, crates, season pass ladder, and status skins arranged as a persuasive system, Risograph editorial illustration in amber and charcoal on warm cream, 16:10 la
Digital Safety
17 May 2026 / 4 min read

Gaming Microtransactions, Loot Boxes, and Battle Passes in Australia: What Parents Should Actually Watch For

A practical Australian guide to gaming spending risks, including currency distancing, loot boxes, battle passes, skins, gifting, status pressure, and why modern games can feel more like platforms than toys.

loot boxes Australiabattle passes childrenmicrotransactions gaming
By Ethan Smith
Read article
On this page
Who this guide is forStart here, then go deeperWhat to do in the first 15 minutesWhat online safety means in Australia nowWhat eSafety can help withAustralia's under-16 social media rulesWhat children under 16 can still useApps matter as much as social mediaFeatures that deserve a second lookLocation sharing, device tracking, and tech-enabled controlWhy the design of platforms mattersWhat cyberbullying looks like in practiceEmoji bullying is realExclusion is not always passiveLove bombing and ghosting can become coerciveSextortion and image-based abuseDeepfakes and AI-generated sexual abuseGaming risks: currency distancing, loot boxes, battle passes and moreMicrotransactionsCurrency distancingLoot boxes and loot cratesBattle passesSkins and social statusOther gaming risks families underestimatePhishing, malware, trojans and account theftAI safety for young people and familiesAI in therapy and online mental health supportAge-based practical guidanceWhat parents and carers can doBuild a no-shame reporting cultureUse payment controlsReview privacy and contact settingsTalk about the social side, not just the technical sideScreenshot before deleting, when safeHelp them practise scriptsKeep the door open after the immediate crisisParental controls, monitoring software, and active oversightWhat parental controls can do wellWhat they do not do wellMonitoring software: useful, but not magicWays children bypass controls that parents often missA practical approach that tends to work betterParent and school checklistParent checklistSchool checklistClinician and youth-work checklistWhat schools should be ready forWhen to report to eSafety, police, ACCCE, ReportCyber or ScamwatchRed flags that someone may need helpFAQCan eSafety help if the child is under 16 and the harm happened on an age-restricted social media platform?Does "not age-restricted" mean a platform is safe for children?Are loot boxes illegal for children in Australia?Is a fake nude still serious if it is AI-generated?Should parents immediately take the phone away?Can AI be used safely in therapy?The practical takeawayRead next in this clusterSupport and official resources
Article details
Category: Digital Safety
Published: 16 May 2026
Reading time: 31 min
online safety AustraliaeSafetycyberbullyingsextortiondeepfakessocial media age restrictionsgaming microtransactionsAI safety

Found this helpful?

Share