570 likes | 670 Views
E-Safety Conference 2014. Aims. To raise awareness and give an overview of the emerging e-safety agenda from a schools perspective. Allow schools to evaluate where they are and allow them to signpost next steps. Highlight support available to schools. Schedule.
E N D
Aims • To raise awareness and give an overview of the emerging e-safety agenda from a schools perspective. • Allow schools to evaluate where they are and allow them to signpost next steps. • Highlight support available to schools.
Schedule • 9:00 – 9:15 Coffee and registration • 9:15 – 9:20 Welcome • 9:20 – 9:40 What does an E-Safe school look like? • 9:40 – 10:15 Keynote: Simon Finch • 10:15 – 10:45 Workshop: How acceptable is your “ Acceptable Use Policy”? • 10:45 – 11:00 Coffee break • 11:00 – 11:15 E-safety and the new Computing Curriculum • 11:15 – 11:30 OFSTED and E-safety – What are they looking for? • 11:30 – 11:50 Key Bytes!!! • 11:50 – 12:10 Group feedback. • 12:10 – 12:30 Next steps.
Feedback - what does an e-safe school look like? • Wholeschool awareness • Techy stuff – forensic monitoring, infrastructure, anti-virus • Safeguarding – cyber bullying • Curriculum - teaching and Learning – Everybody • Policies – AUP, E-safety ( everybody should understand this) • National Events and groups e.g. CEOP • Procedures for managing social media, logging incidents
Workshop How acceptableis your “Acceptable Use Policy”?
Scenario 1 Miss Peach borrows a school iPad and laptop which she takes home. When she is not using it for school work she uses it for personal use.
Scenario 2 Sergeant Grey is taking his group on the annual trip to Beamish. He has forgotten the school camera but has his own phone which has a camera attached. He uses this to take pictures. He downloads them to the school network as soon as he gets back.
Scenario 3 Ms Gold has had a bad day at school. When she gets home she adds a status to Friendbook to say so.
Scenario 4 Professor Plum has spare time at lunchtimes and uses a school machine to research and book his holiday for half term.
Scenario 5 Colonel Mustard retired last term. The school have left his school accounts and e mail active for a month so he can organise his affairs.
Scenario 6 Mrs White is a disgruntled grandparent and has commented on Friendbook to air a grievance. She has named a teacher at her grandchild’s school. Others have commented on her post. News has spread around the playground!
Scenario 7 Dr Black intends to finish his reports at home because he said he had too much to do in school. He will bring the finished documents back in to school and load onto the school network on a memory stick.
Scenarios Feedback • Personal use not a family computer • Caution with personal banking etc. • Staff access monitored and filtered by VPN • No – have no control over what doing at home 1 • NO! He shouldn’t use his phone - this is to protect himself and the students • Simon disagreed. AUP should be acceptable and enable you to do your job properly • Ian – consider the audience of images and where to store them 2 • Don’t do it • Context of the bad day – at work or at school? • Why is there a need to do it? • People have a need to be social 3
Scenarios Feedback • Not a problem it is staff personal time • Often heads discretion rather than documented • Monitoring would be in place • Staff should be made aware of what is ‘acceptable’ 4 • Organise his affairs before he leaves • Down to heads discretion some allow restricted access for users after leaving who are still supporting the school in some way • Staff access should be disabled immediately 5 • Can involve police • Legally what can we do? Legal advice has been sought • Need to educate parents re social media 6
Scenarios Feedback • If encrypted • Use remote access or VLE for reports • Minimise risks • Is e-mail safer? • Is email secure – e.g. council advises that sensitive information should not be sent by email 7
New Curriculum Implementation September 2014. The curriculum subject is now called Computing. This continues to incorporate all the facets of the subject, including: • computer science • digital literacy • information technologies. A major inclusion is that of E-safety
Aims • can understand and apply the fundamental principles and concepts of computer science, including abstraction, logic, algorithms and data representation • can analyse problems in computational terms, and have repeated practical experience of writing computer programs in order to solve such problems • can evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems • are responsible, competent, confident and creative users of information and communication technology
Subject contentKey Stage 1 Subject contentKey Stage 1 Pupils should be taught to: • understand what algorithms are; how they are implemented as programs on digital devices; and that programs execute by following precise and unambiguous instructions • create and debug simple programs • use logical reasoning to predict the behaviour of simple programs • use technology purposefully to create, organise, store, manipulate and retrieve digital content • use technology safely and respectfully, keeping personal information private; know where to go for help and support when they have concerns about material on the internet • recognise common uses of information technology beyond school
Subject contentKey Stage 2 Key Stage 2 Pupils should be taught to: • design, write and debug programs that accomplish specific goals, including controlling or simulating physical systems; solve problems by decomposing them into smaller parts • use sequence, selection, and repetition in programs; work with variables and various forms of input and output • use logical reasoning to explain how some simple algorithms work and to detect and correct errors in algorithms and programs • understand computer networks including the internet; how they can provide multiple services, such as the world-wide web; and the opportunities they offer for communication and collaboration • use search technologies effectively, appreciate how results are selected and ranked, and be discerning in evaluating digital content • use technology safely, respectfully and responsibly; know a range of ways to report concerns and inappropriate behaviour • select, use and combine a variety of software (including internet services) on a range of digital devices to accomplish given goals, including collecting, analysing, evaluating and presenting data and information.
Subject contentKey Stage 3 • design, use and evaluate computational abstractions that model the state and behaviour of real-world problems and physical systems • understand several key algorithms that reflect computational thinking [for example, ones for sorting and searching]; use logical reasoning to compare the utility of alternative algorithms for the same problem • use two or more programming languages, at least one of which is textual, to solve a variety of computational problems; make appropriate use of data structures [for example, lists, tables or arrays]; design and develop modular programs that use procedures or functions • understand simple Boolean logic [for example, AND, OR and NOT] and some of its uses in circuits and programming; understand how numbers can be represented in binary, and be able to carry out simple operations on binary numbers [for example, binary addition, and conversion between binary and decimal] • understand the hardware and software components that make up computer systems, and how they communicate with one another and with other systems • understand how instructions are stored and executed within a computer system; understand how data of various types (including text, sounds and pictures) can be represented and manipulated digitally, in the form of binary digits • undertake creative projects that involve selecting, using, and combining multiple applications, preferably across a range of devices, to achieve challenging goals, including collecting and analysing data and meeting the needs of known users • create, re-use, revise and re-purpose digital artefacts for a given audience, with attention to trustworthiness, design and usability • understand a range of ways to use technology safely, respectfully, responsibly and securely, including protecting their online identity and privacy; recognise inappropriate content, contact and conduct and know how to report concerns.
Subject contentKey Stage 4 • All pupils must have the opportunity to study aspects of information technology and computer science at sufficient depth to allow them to progress to higher levels of study or to a professional career. All pupils should be taught to: • develop their capability, creativity and knowledge in computer science, digital media and information technology • develop and apply their analytic, problem-solving, design, and computational thinking skills • understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to identify and report a range of concerns.
What does it mean in school? Year 1 Make an avatar using a paint program and display in school. Year 2 Make a cover for a game with PEGI rating on it. Year 3 Make a database of favourite games. Year 4 Make a helpsheet for frequently used abbreviations in textspeak. Year 5 Comment on others work using learning platform or another secure site. Year 6 Create a website or blog including video, images and sounds.
Schools ability… to protect and educate pupils and staff in their use of technology. to have the appropriate mechanisms to intervene and support any incident where appropriate.
Breadth of issues within E safety The breadth of issues classified within e-safety is considerable, but can be categorised into three areas of risk: • content: being exposed to illegal, inappropriate or harmful material • contact: being subjected to harmful online interaction with other users • conduct: personal online behaviour that increases the likelihood of, or causes, harm.
Key features of good and outstanding practice • Whole School Consistent Approach • Robust and integrated reporting routines • Staff • Policies • Education • Infrastructure • Monitoring and Evaluating • Management of personal data
Whole school consistent approach • All teaching and non-teaching staff can recognise and are aware of e-safety issues. • High quality leadership and management make e-safety a priority across all areas of the school (the school may also have achieved a recognised standard, for example the e-Safety Mark). • A high priority given to training in e-safety, extending expertise widely and building internal capacity. • The contribution of pupils, parents and the wider school community is valued and integrated.
Robust and integrated reporting routines • School-based reporting routes that are clearly understood and used by the whole school, for example online anonymous reporting systems. • Report Abuse buttons, for example CEOP. Clear, signposted and respected routes to key members of staff. Effective use of peer mentoring and support.
Staff • All teaching and non-teaching staff receive regular and up-to-date training. • One or more members of staff have a higher level of expertise and clearly defined responsibilities.
Policies • Rigorous e-safety policies and procedures are in place, written in plain English, contributed to by the whole school, updated regularly and ratified by governors. • The e-safety policy should be integrated with other relevant policies such as behaviour, safeguarding and anti-bullying. • The e-safety policy should incorporate an Acceptable Usage Policy that is understood and respected by pupils, staff and parents.
Education • An age-appropriate e-safety curriculum that is flexible, relevant and engages pupils’ interest; that is used to promote e-safety through teaching pupils how to stay safe, how to protect themselves from harm and how to take responsibility for their own and others’ safety. • Positive rewards are used to cultivate positive and responsible use. • Peer mentoring programmes.
Infrastructure • Recognised Internet Service Provider (ISP) or Regional Broadband Consortium (RBC) together with age-related filtering that is actively monitored.
Monitoring and Evaluation • Risk assessment taken seriously and used to good effect in promoting e-safety. • Using data effectively to assess the impact of e-safety practice and how this informs strategy.
Management of Personal Data • The impact level of personal data is understood and data is managed securely and in accordance with the statutory requirements of the Data Protection Act 1998. • Any professional communications between the setting and clients that utilise technology should: • take place within clear and explicit professional boundaries • be transparent and open to scrutiny • not share any personal information with a child or young person.
Indicators of Inadequate Practice • Personal data is often unsecured and/or leaves school site without encryption. • Security of passwords is ineffective, for example passwords are shared or common with all but the youngest children. • Policies are generic and not updated. • There is no progressive, planned e-safety education across the curriculum, for example there is only an assembly held annually. • There is no internet filtering or monitoring. • There is no evidence of staff training. • Children are not aware of how to report a problem.
Ofsted Questions to School Leadership • How do you ensure that all staff receive appropriate online safety training that is relevant and regularly up to date? • What mechanisms does the school have in place to support pupils and staff facing online safety issues? • How does the school educate and support parents and whole school community with online safety?
Ofsted Questions to School Leadership • Does the school have e-safety policies and acceptable use policies in place? How does the school know that they are clear and understood and respected by all? • Describe how your school educates children and young people to build knowledge, skills and capability when it comes to online safety? How do you assess its effectiveness?
Ofsted Questions to pupils • If you felt uncomfortable about anything you saw, or if anybody asked you for your personal details such as your address on the internet would you know where to go for help? • If anybody sent you hurtful messages on the internet or on your mobile phone would you know who to tell? • Can you tell me one of the rules your school has for using the internet? • Can you describe the risks of posting inappropriate content on the internet?
Sample Questions for staff • Have you had any training that shows the risks to your and pupils online safety? • Are there policies in place that clearly demonstrate good and safe internet practice for staff and pupils? • Are there sanctions in place to enforce the above policies? • Do all staff understand what is meant by the term cyber-bullying and the effect it can have on themselves and pupils? • Are their clear reporting mechanisms with a set of actions in place for staff or pupils who feel they are being bullied online? • Does the school have any plans for an event on Safer Internet Day? (This is an annual event, now in its fifth year at least, so schools that participate will know about the event).
CPD Courses Digital Footprint 28th Jan and 4th Feb 2014 5th and 12th March 2014 11th February 2014
Data Security Policy Information and ICT Security Policy Available for reuse on www.ictinschools.org