E N D
1. Primary ICT E-safety Workshops 31st Jan and 1st Feb 2012
2. Agenda
3. Agenda
4. Objectives
5. Keeping up with the Joneses SID resources 2012
6. E-safety Review What have you come to this e-safety workshop for?
Have you, or the school, had issues with online safety
7. Surrey E-safety Website
8. Surrey Safeguarding Children Board E-safety documents
Important for all other aspects of safeguarding
www.surreycc.gov.uk
9. Important documents for schools E-safety Toolkit Jan 2012 Draft
Safe Practice with Technology now part of FAQs Learning #platform dev Learning #platform dev
10. The Safer Internet Centre has been funded by the European Commission to provide a Helpline for professionals who work with children and young people in the UK, specifically tackling the area of e-safety. We provide support with all aspects of digital and online issues such as social networking sites, cyber-bullying, sexting, online gaming and child protection online. The Helpline aims to resolve issues professionals face about themselves, such as protecting professional identity and reputation, as well as young people in relation to online safety. Updates -safer internet website
12. A recent study, conducted by Plymouth Council, surveyed the internet habits of 423 under-fives, with an average age of four.
It found 305 used the internet every day, often unsupervised.
Whilst the survey indicated that the most popular sites were CBeebies and Peppa Pig,Professor Tanya Byron, a clinical psychologist, said leaving a five-year-old unsupervised on the internet is equivalent to abandoning a kid in a shopping centre for a couple of hours.
If you work in an Early Years setting and want further information then why not take a look at:-
Plymouth's Early Years Toolkit.
Plymouth Council Survey Mar 2011
13. Improving e-safety in primary schools: a guidance document
Useful review of where Primary schools are in relation to e-safety.
September 2011Centre for Education and Inclusion ResearchSheffield Hallam University Shipton Report CEIR
14. Ofsted Framework 2012
15. Ofsted Framework 2012 Achievement of pupils at the school
Quality of teaching in the school
Behaviour and safety of pupils at the school
Quality of leadership in and management of the school
= Overall effectiveness
If one of the 4 is inadequate then overall effectiveness is inadequate
2012 easier to understand because only 4 judgements instead of 322012 easier to understand because only 4 judgements instead of 32
16. Criteria for Behaviour and Safety When evaluating the behaviour and safety of pupils at the school, inspectors must consider:
pupils attitudes to learning and conduct in lessons and around the school
pupils behaviour towards, and respect for, other young people and adults, including, for example, freedom from bullying and harassment that may include cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability
how well teachers manage the behaviour and expectations of pupils to ensure that all pupils have an equal and fair chance to thrive and learn in an atmosphere of respect and dignity
pupils ability to assess and manage risk appropriately and keep themselves safe
how well the school ensures the systematic and consistent management of behaviour. E-safety most dominate in Behaviour and L&M
Features as part of bullying
Ability fo pupils to assess risks and know what to do about it
L&M systems in place to cope with itE-safety most dominate in Behaviour and L&M
Features as part of bullying
Ability fo pupils to assess risks and know what to do about it
L&M systems in place to cope with it
17. How to evaluate the range of evidence (judgements must not be made solely on the basis of what is seen during an inspection}: Evidence for B&S may contributions to spiritual, moral, social and cultural
Types, rates and patterns of bullying
. including cyber-bullying
The extent to which pupils are able to understand and respond to risk, for example risks associated with extremism, new technology
SMSC on Efs
pupil interviews
Monitoring systems
Observations in playgrounds etcSMSC on Efs
pupil interviews
Monitoring systems
Observations in playgrounds etc
18. Translates into a grade descriptor for Outstanding of
Instances of bullying, including for example, cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability, are extremely rare.
Pupils are acutely aware of different forms of bullying and actively try to prevent it from occurring.
The school has an active and highly effective approach to identifying and tackling bullying. All groups of pupils feel safe at school at all times.
They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe. Emphasis is on pupils being educated, not shieldedEmphasis is on pupils being educated, not shielded
19. Leadership and management Outline guidance inspectors should focus on how effective L&M overcomes barriers to learning, these are likely to include:
strategies and procedures, including the provision of appropriate guidance, to help pupils prepare for life in modern democratic Britain and a global society
L& M at all levels
Internet worries mustnt be a barrier to learning so need to have:
Procedures and systems
Pupils educated about risks
and using global resources
L& M at all levels
Internet worries mustnt be a barrier to learning so need to have:
Procedures and systems
Pupils educated about risks
and using global resources
20. Safer Internet Day 2012 Tuesday 7th February 2012
Connecting generations and educating each other,
http://www.saferinternet.org
21. Resources available
Thinkuknow.co.uk SID day (requires registration)
Safer Internet Day website
Insafe website
Lesson plans
Banners/logo/posters/videos
Keeping up with the Joneses (Thinkuknow.co.uk)
Assembly PowerPoint
SID radio
All web links available from SID page of Surrey e-safety website What resources are available?
22. Assembly PowerPoint
23. What can schools do?
24. SWGfL 360°°° Safe SWGfL e-safety self review tool
Free to register
May become costed
Obtain an e-safety Mark
Ł750 for assessment Learning #platform dev Learning #platform dev
31. E-Safety and the Curriculum
32. Updated Surrey E-Safety SoW Maps out e-safety progression
Incorporates e-safety resources
Recognises links to PSHCE/ICT
33. Latest teaching resources
34. SEN Resources
Know Your Friends with Josh and Sue
5 minute animation for KS2
3 versions created inc. audio only.
www.thinkuknow.co.uk Some groups of children are potentially more vulnerable & at risk than others when using ICT, e.g. children with Autism Spectrum Disorder may make very literal interpretations of the content they encounter, affecting their responses. Some children with complex needs may not understand concepts of friendship and therefore trust people implicitly.
With this in mind, CEOP have created some SEN resources, inc a 5 min animation, Know Your Friends with Josh and Sue depicting 2 friends who are the victims of cyberbullying. 3 versions have been created for different needs. Important messages, delivered in a clear unambiguous way. Some groups of children are potentially more vulnerable & at risk than others when using ICT, e.g. children with Autism Spectrum Disorder may make very literal interpretations of the content they encounter, affecting their responses. Some children with complex needs may not understand concepts of friendship and therefore trust people implicitly.
With this in mind, CEOP have created some SEN resources, inc a 5 min animation, Know Your Friends with Josh and Sue depicting 2 friends who are the victims of cyberbullying. 3 versions have been created for different needs. Important messages, delivered in a clear unambiguous way.
35. Further E-Safety Resources Allied to this are the other E-Safety resources out there
New games from NWLG, aimed at upper KS2, with very scenarios/questions to consider. Very popular amongst pupils.
SMART Crew lower KS2 excellent way to introduce the SMART rulesAllied to this are the other E-Safety resources out there
New games from NWLG, aimed at upper KS2, with very scenarios/questions to consider. Very popular amongst pupils.
SMART Crew lower KS2 excellent way to introduce the SMART rules
36. Resources to support E-Safety-themed days or weeks Intended to support E-Safety themed days or weeks.
Can be used for assemblies or group-based activities.
Ideas for using on and offline resources.
37. Where do I find them? From E-Safety home page, click on Curriculum tab.
38. Keeping your Data Secure
39. Data Handling Update Session builds on guidance developed by Becta and shared at last years events
Set in the context of your schools legal responsibility to keep personal data safe and secure
Development of guidance for Surrey schools in relation handling information and data
There is a clear link between sound e-safety policies and practice with effective data handling
Session builds on guidance developed by Becta. This was shared last year and on www.surreylearning/ictleaders website alongside questions for review
Session builds on guidance developed by Becta. This was shared last year and on www.surreylearning/ictleaders website alongside questions for review
40. Guidance includes the following:
Key actions for schools
Golden rules for staff
Managing passwords
Avoiding unauthorised access to data and information
Data Handling Update
41. Be aware of your responsibilities in relation to ensuring data and information is secure
Know what sensitive data and information is in the school and who has access to it
Ensure your school has policies, protocols in place, such as, a password policy
Consider the place of protective marking of data and information and encryption of ICT equipment Key Actions for Schools Highlight following which are crucail
Highlight following which are crucail
42. The Golden Rules for Staff Include:
Always keep your passwords secret
Never access data unless you have a professional need to do so
Always log off unattended PCs and laptops
Never leave electronic equipment, such as laptop computers, or sensitive documents or papers in an unattended vehicle
Always be aware of the sensitive nature of the data you are sending
Ensure you double check who you are sending information to prior to sending
Never hold data for longer than you need to and delete it when its use is no longer required
Avoid the use of personal emails for professional use
43. Passwords Passwords should consist of at least eight characters including a combination of capital letters, lower case letters and numbers
Avoid creating passwords using:
Dictionary words in any language
Words spelled backwards, common misspellings, and abbreviations
Sequences or repeated characters, for example: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty)
Personal information, such as, your name, birthday, driver's licence, passport number, or similar information
44. Avoiding unauthorised access To include:
Use features within software, such as word to protect documents with passwords to prevent access
Use your schools learning platform to provide secure access to data and information
Dont click on links in unsolicited emails and only download files or programs from sources you trust
Ask third parties how they will protect sensitive information once it has been passed to them
Use encrypted portable storage devices
Use encryption software on laptops to prevent access to files
Keep your PCs and laptops up to date with the latest security updates
45. Encryption Encryption is used to improve the security of a file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it
Encryption is managed by changing plain text into mathematical logic, or algorithms
Whole drives or disks can encrypted or just specific files and folders
46. Sources of Guidance www.surreycc.gov.uk/safeguarding
For e safety in guidance and protocols section
Use of emails
Information on SNet
Including information of passwords
47. Lots of Monitoring companies
4S have worked with Securus for 10 years
Many Secondary schools use the Securus solution in their school.
Some Primaries also have take it up.
Securus have worked with a server based company Redstor, already known in Surrey, to provide a remote solution for Primary schools.
Babcock 4S have worked with Redstor to create a price point that is practicable for schools. Safeguarding Software
48. Computer monitoring software, installed on school computers, identifies a wide range of e-safety issues within online and offline applications..
Can have a AUP when first login
Screenshot taken of any concern to show the context of what took place and who was involved.
Requires oversight by senior leader
KS1 get it for free in a primary school
Reception/ KS1 not sold to on own Primary Securus Solution Operated by Redstor
49. Price per pupil = Ł2.74 Minimum per school Ł228
Optional additional cost for installation and Training = Ł500 per school
Cost for Surrey Schools