{"id":13052,"date":"2024-10-31T11:35:12","date_gmt":"2024-10-31T11:35:12","guid":{"rendered":"https:\/\/www.cyber40.it\/5-who-to-turn-to\/"},"modified":"2025-05-15T19:46:10","modified_gmt":"2025-05-15T19:46:10","slug":"5-who-to-turn-to","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/","title":{"rendered":"#5 Who to turn to"},"content":{"rendered":"\n<p>Surfing the Web can be a complex experience, and sometimes one may come across disturbing or unpleasant content. It is crucial not to face these situations alone. Talking about it with friends, teachers or family members can make a difference and help find solutions.<\/p>\n\n<p>If you or someone you know is in trouble online, do not hesitate to contact the Helpline of the Blue Telephone at 1.96.96 or the Postal Police for serious situations. Remember, listening and supporting each other are essential to overcome fears related to the digital world.<\/p>\n\n<p>Law 71\/2017 stipulates that children over the age of 14 and their parents or guardians can request that harmful online content be blocked, removed, or obscured from website or social media operators.<\/p>\n\n<p>If the operators fail to take action within 48 hours, it is possible to appeal to the Data Protection Authority, which is required to take action within 48 hours.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1100\" height=\"1629\" src=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big.jpg\" alt=\"pill 5 web big\" class=\"wp-image-10371\" srcset=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big.jpg 1100w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big-203x300.jpg 203w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big-691x1024.jpg 691w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big-768x1137.jpg 768w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big-1037x1536.jpg 1037w, https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill_5-web_big-135x200.jpg 135w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\" \/><\/figure>\n<style>.wp-block-kadence-advancedbtn.kb-btns10370_020050-8f{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns10370_020050-8f .kt-button{font-weight:normal;font-style:normal;}.kt-btns10370_020050-8f .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns10370_020050-8f .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns10370_020050-8f\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn10370_c3599a-79.kb-button{width:initial;}<\/style><a class=\"kb-button kt-button button kb-btn10370_c3599a-79 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\" href=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/pill5-web.pdf\"><span class=\"kt-btn-inner-text\">DOWNLOAD PDF<\/span><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Surfing the Web can be a complex experience, and sometimes one may come across disturbing or unpleasant content. It is crucial not to face these situations alone. Talking about it with friends, teachers or family members can make a difference&#8230;<\/p>\n","protected":false},"author":16,"featured_media":12880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":2,"footnotes":""},"categories":[615],"tags":[],"class_list":["post-13052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2cents-on-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>#5 Who to turn to - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"#5 Who to turn to - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Surfing the Web can be a complex experience, and sometimes one may come across disturbing or unpleasant content. It is crucial not to face these situations alone. Talking about it with friends, teachers or family members can make a difference...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-31T11:35:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T19:46:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NetGroup23\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NetGroup23\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\"},\"author\":{\"name\":\"NetGroup23\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/6d6cf2eec4b19ad5283f4a4beca11247\"},\"headline\":\"#5 Who to turn to\",\"datePublished\":\"2024-10-31T11:35:12+00:00\",\"dateModified\":\"2025-05-15T19:46:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\"},\"wordCount\":150,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\",\"articleSection\":[\"2Cents on Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\",\"name\":\"#5 Who to turn to - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\",\"datePublished\":\"2024-10-31T11:35:12+00:00\",\"dateModified\":\"2025-05-15T19:46:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg\",\"width\":600,\"height\":351,\"caption\":\"2cents visual carousel 5 ok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"#5 Who to turn to\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/6d6cf2eec4b19ad5283f4a4beca11247\",\"name\":\"NetGroup23\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0bbd9fcfbda53d6aefdaa465b6c5dcb6a06a66396794cfd58ecdae5e0822a54c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0bbd9fcfbda53d6aefdaa465b6c5dcb6a06a66396794cfd58ecdae5e0822a54c?s=96&d=mm&r=g\",\"caption\":\"NetGroup23\"},\"url\":\"https:\/\/www.cyber40.it\/en\/author\/netgroup23\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"#5 Who to turn to - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/","og_locale":"en_US","og_type":"article","og_title":"#5 Who to turn to - Cyber 4.0","og_description":"Surfing the Web can be a complex experience, and sometimes one may come across disturbing or unpleasant content. It is crucial not to face these situations alone. Talking about it with friends, teachers or family members can make a difference...","og_url":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/","og_site_name":"Cyber 4.0","article_published_time":"2024-10-31T11:35:12+00:00","article_modified_time":"2025-05-15T19:46:10+00:00","og_image":[{"width":600,"height":351,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg","type":"image\/jpeg"}],"author":"NetGroup23","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NetGroup23","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/"},"author":{"name":"NetGroup23","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/6d6cf2eec4b19ad5283f4a4beca11247"},"headline":"#5 Who to turn to","datePublished":"2024-10-31T11:35:12+00:00","dateModified":"2025-05-15T19:46:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/"},"wordCount":150,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg","articleSection":["2Cents on Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/","url":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/","name":"#5 Who to turn to - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg","datePublished":"2024-10-31T11:35:12+00:00","dateModified":"2025-05-15T19:46:10+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg","width":600,"height":351,"caption":"2cents visual carousel 5 ok"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/5-who-to-turn-to\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"#5 Who to turn to"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/6d6cf2eec4b19ad5283f4a4beca11247","name":"NetGroup23","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0bbd9fcfbda53d6aefdaa465b6c5dcb6a06a66396794cfd58ecdae5e0822a54c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bbd9fcfbda53d6aefdaa465b6c5dcb6a06a66396794cfd58ecdae5e0822a54c?s=96&d=mm&r=g","caption":"NetGroup23"},"url":"https:\/\/www.cyber40.it\/en\/author\/netgroup23\/"}]}},"taxonomy_info":{"category":[{"value":615,"label":"2Cents on Security"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/10\/2cents-visual-carousel-_5_ok.jpg",600,351,false],"author_info":{"display_name":"NetGroup23","author_link":"https:\/\/www.cyber40.it\/en\/author\/netgroup23\/"},"comment_info":"","category_info":[{"term_id":615,"name":"2Cents on Security","slug":"2cents-on-security-en","term_group":0,"term_taxonomy_id":615,"taxonomy":"category","description":"","parent":0,"count":15,"filter":"raw","term_order":"0","cat_ID":615,"category_count":15,"category_description":"","cat_name":"2Cents on Security","category_nicename":"2cents-on-security-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13052"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13052\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/12880"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}