1 / 47

Primary ICT E-safety Workshops 31 st Jan and 1 st Feb 2012

Primary ICT E-safety Workshops 31 st Jan and 1 st Feb 2012. Agenda. Objectives. Keeping up with the Joneses SID resources 2012. What have you come to this e-safety workshop for? Have you, or the school, had issues with online safety. E-safety Review. http://www.surreyesafety.co.uk.

Download Presentation

Primary ICT E-safety Workshops 31 st Jan and 1 st Feb 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Primary ICT E-safety Workshops 31st Jan and 1st Feb 2012

  2. Agenda

  3. Objectives

  4. Keeping up with the Joneses SID resources 2012

  5. What have you come to this e-safety workshop for? Have you, or the school, had issues with online safety E-safety Review

  6. http://www.surreyesafety.co.uk Surrey E-safety Website

  7. E-safety documents Important for all other aspects of safeguarding www.surreycc.gov.uk Surrey Safeguarding Children Board

  8. E-safety Toolkit Jan 2012 Draft Safe Practice with Technology now part of FAQs Important documents for schools

  9. Updates -safer internet website • The Safer Internet Centre has been funded by the European Commission to provide a Helpline for professionals who work with children and young people in the UK, specifically tackling the area of e-safety. We provide support with all aspects of digital and online issues such as social networking sites, cyber-bullying, sexting, online gaming and child protection online. The Helpline aims to resolve issues professionals face about themselves, such as protecting professional identity and reputation, as well as young people in relation to online safety.

  10. What has been reported • The Online Abuse of Professionals – Research Report from the UK Safer Internet Centre. Prof Andy Phippen, University of Plymouth. • Aug 2011 • 35% respondents said that either they, or their colleagues, have been subject to some form of online abuse. Abuse from pupils (72%) parents (26%) and other staff (12%).

  11. Plymouth Council Survey Mar 2011 • A recent study, conducted by Plymouth Council, surveyed the internet habits of 423 under-fives, with an average age of four. • It found 305 used the internet every day, often unsupervised. • Whilst the survey indicated that the most popular sites were CBeebies and PeppaPig,Professor Tanya Byron, a clinical psychologist, said leaving a five-year-old unsupervised on the internet is equivalent to ‘abandoning a kid in a shopping centre for a couple of hours’. • If you work in an Early Years setting and want further information then why not take a look at:- • Plymouth's Early Years Toolkit.

  12. Shipton Report CEIR Improving e-safety in primary schools: a guidance document • Useful review of where Primary schools are in relation to e-safety. • September 2011Centre for Education and Inclusion ResearchSheffield Hallam University

  13. Ofsted Framework 2012

  14. Ofsted Framework 2012 • Achievement of pupils at the school • Quality of teaching in the school • Behaviour and safety of pupils at the school • Quality of leadership in and management of the school = Overall effectiveness If one of the 4 is inadequate then overall effectiveness is inadequate

  15. Criteria for Behaviour and Safety When evaluating the behaviour and safety of pupils at the school, inspectors must consider: • pupils’ attitudes to learning and conduct in lessons and around the school • pupils’ behaviour towards, and respect for, other young people and adults, including, for example, freedom from bullying and harassment that may include cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability • how well teachers manage the behaviour and expectations of pupils to ensure that all pupils have an equal and fair chance to thrive and learn in an atmosphere of respect and dignity • pupils’ ability to assess and manage risk appropriately and keep themselves safe • how well the school ensures the systematic and consistent management of behaviour.

  16. How to evaluate – the range of evidence (judgements must not be made solely on the basis of what is seen during an inspection}: • Evidence for B&S may contributions to spiritual, moral, social and cultural • Types, rates and patterns of bullying…. including cyber-bullying • The extent to which pupils are able to understand and respond to risk, for example risks associated with extremism, new technology…

  17. Translates into a grade descriptor for Outstanding of… Instances of bullying, including for example, cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability, are extremely rare. Pupils are acutely aware of different forms of bullying and actively try to prevent it from occurring. The school has an active and highly effective approach to identifying and tackling bullying. All groups of pupils feel safe at school at all times. They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe.

  18. Leadership and management Outline guidance – inspectors should focus on how effective L&M overcomes barriers to learning, these are likely to include: • strategies and procedures, including the provision of appropriate guidance, to help pupils prepare for life in modern democratic Britain and a global society

  19. Tuesday 7th February 2012 ‘Connecting generations and educating each other’, http://www.saferinternet.org Safer Internet Day 2012

  20. What resources are available? • Resources available • Thinkuknow.co.uk SID day (requires registration) • Safer Internet Day website • Insafe website • Lesson plans • Banners/logo/posters/videos • ‘Keeping up with the Joneses’ (Thinkuknow.co.uk) • Assembly PowerPoint • SID radio • All web links available from SID page of Surrey e-safety website

  21. Assembly PowerPoint

  22. What can schools do? • Register to connect with other schools http://www.saferinternetday.org/web/guest/school-registration • Organise an in-school e-safety event (assembly, after school event) • Open the event to parents, carers, grandparents, as well as young people • If possible, coordinate activities with other schools • Use the resources at a later time of the year

  23. SWGfL e-safety self review tool Free to register May become costed Obtain an e-safety Mark £750 for assessment SWGfL 360̊̊̊ Safe

  24. Revised Surrey E-safety Toolkit

  25. What’s new? E-safety Committee to include an E-safety Coordinator, a governor and the CPLO Education and CPD - Staff CPD (inc governors), Students curriculum, Parent meetings E-safety Risks Internet Social networking, IM, VC, chat, email, blogging VLEs Gaming Mobile phones and handheld technology File sharing Filtering Data handling Pupil Groups and Pupils with Additional Needs

  26. Where to start… E-safety Audit

  27. E-safety Audit

  28. What your school can do next… • Identify any gaps in the schools’ e-safety provision • Update policies where necessary • Ensure training is made available for all • Ensure that all staff are aware of your schools response procedures – e.g.do they know who is on the e-safety committee? Does the e-safety coordinator have a log book for e-safety incidents?

  29. E-Safety and the Curriculum

  30. Updated Surrey E-Safety SoW • Maps out e-safety progression • Incorporates e-safety resources • Recognises links to PSHCE/ICT

  31. Latest teaching resources Smartie the Penguin http://kidsmart.org.uk Aimed at 3-7 years.

  32. SEN Resources • ‘Know Your Friends with Josh and Sue’ • 5 minute animation for KS2 • 3 versions created inc. audio only. • www.thinkuknow.co.uk

  33. Further E-Safety Resources Hector’s World

  34. Resources to support E-Safety-themed days or weeks • Intended to support E-Safety themed days or weeks. • Can be used for assemblies or group-based activities. • Ideas for using on and offline resources.

  35. Where do I find them? • From E-Safety home page, click on Curriculum tab.

  36. Keeping your Data Secure

  37. Data Handling Update • Session builds on guidance developed by Becta and shared at last year’s events • Set in the context of your school’s legal responsibility to keep personal data safe and secure • Development of guidance for Surrey schools in relation handling information and data • There is a clear link between sound e-safety policies and practice with effective data handling

  38. Data Handling Update Guidance includes the following: • Key actions for schools • Golden rules for staff • Managing passwords • Avoiding unauthorised access to data and information

  39. Key Actions for Schools • Be aware of your responsibilities in relation to ensuring data and information is secure • Know what sensitive data and information is in the school and who has access to it • Ensure your school has policies, protocols in place, such as, a password policy • Consider the place of protective marking of data and information and encryption of ICT equipment

  40. Include: Always keep your passwords secret Never access data unless you have a professional need to do so Always log off unattended PCs and laptops Never leave electronic equipment, such as laptop computers, or sensitive documents or papers in an unattended vehicle Always be aware of the sensitive nature of the data you are sending Ensure you double check who you are sending information to prior to sending Never hold data for longer than you need to and delete it when its use is no longer required Avoid the use of personal emails for professional use The Golden Rules for Staff

  41. Passwords should consist of at least eight characters including a combination of capital letters, lower case letters and numbers Avoid creating passwords using: Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters, for example: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) Personal information, such as, your name, birthday, driver's licence, passport number, or similar information Passwords

  42. To include: Use features within software, such as word to protect documents with passwords to prevent access Use your school’s learning platform to provide secure access to data and information Don’t click on links in unsolicited emails and only download files or programs from sources you trust Ask third parties how they will protect sensitive information once it has been passed to them Use encrypted portable storage devices Use encryption software on laptops to prevent access to files Keep your PCs and laptops up to date with the latest security updates Avoiding unauthorised access

  43. Encryption is used to improve the security of a file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it Encryption is managed by changing plain text into mathematical logic, or algorithms Whole drives or disks can encrypted or just specific files and folders Encryption

  44. www.surreycc.gov.uk/safeguarding For e safety in guidance and protocols section Use of emails Information on SNet Including information of passwords Sources of Guidance

  45. Safeguarding Software • Lots of Monitoring companies • 4S have worked with Securus for 10 years • Many Secondary schools use the Securus solution in their school. • Some Primaries also have take it up. • Securus have worked with a server based company Redstor, already known in Surrey, to provide a remote solution for Primary schools. • Babcock 4S have worked with Redstor to create a price point that is practicable for schools.

  46. Primary Securus Solution Operated by Redstor • Computer monitoring software, installed on school computers, identifies a wide range of e-safety issues within online and offline applications.. • Can have a AUP when first login • Screenshot taken of any concern to show the context of what took place and who was involved. • Requires oversight by senior leader • KS1 get it for free in a primary school • Reception/ KS1 not sold to on own

  47. Cost for Surrey Schools • Price per pupil = £2.74 Minimum per school £228 • Optional additional cost for installation and Training = £500 per school

More Related