1 / 19

e-Safeguarding Approaches

e-Safeguarding Approaches. Neil Turner – Central Bedfordshire. e-Safeguarding Approaches. Series of meetings (6) where all schools were invited (99% attendance) Introduced by BECTa regional consultant Input from schools in e-Safety and e-Security

chico
Download Presentation

e-Safeguarding Approaches

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. e-Safeguarding Approaches Neil Turner – Central Bedfordshire

  2. e-Safeguarding Approaches

  3. Series of meetings (6) where all schools were invited (99% attendance) Introduced by BECTa regional consultant Input from schools in e-Safety and e-Security Post launch needed to reinforce ‘being realistic’ Launch to Schools

  4. e-Safeguarding Approaches

  5. Exploring the Required Procedures Roles and Responsibilities

  6. Exploring the Required Procedures Risk Assessment • Who does it? • How is it done? • How often is it done? • Who is it reported to? • How is follow up action monitored?

  7. Exploring the Required Procedures Information Classification • Who decides on the classifications? • How do users know the classifications? • When is it updated?

  8. Exploring the Required Procedures Access Controls • Are user names and passwords in place? • Are logins related to the information classifications? • Is the Network secure?

  9. Exploring the Required Procedures Use of ICT Systems • How is on-line communication monitored? • Is there an e-safety syllabus regularly re-visited by staff and students? • Does the AUP accurately outline how all procedures are carried out?

  10. Exploring the Required Procedures Password Security • Is there a clear policy regarding password conventions and renewing? • How is it monitored? Don’t tell anyone

  11. Exploring the Required Procedures Incident Reporting • Is everyone clear about how to report an incident? • Who holds and monitors the Incident Log? • How is action taken when an incident is reported?

  12. Exploring the Required Procedures Starters & Leavers • Who enters and removes staff and students from the system • How does this person get the information about starters and leavers?

  13. Exploring the Required Procedures Remote Access • Are the rules about taking ICT equipment of the school premises? • Is the system set up securely to enable users to access the network from outside?

  14. E-Safeguarding Approaches The Challenges presented to the schools • From the checklists, what are the immediate priorities for action in individual schools? Is there a pattern in these priorities? • What appear to be the key priorities for the longer term – over the next three years? • Is there potential for mutual support/collaboration between schools on short and/or longer term priorities? • How can e-security and e-safety become more integrated in school improvement planning at all levels?

  15. Shared with the NEN e-Safety group Worked in partnership with e2Bn YHGfL Northern Grid Available for all What did we donext?

  16. It looks like this http://www.northerngrid.org/nen/esg_audit

  17. And the downloadable paper version has got this! E-Safeguarding Procedures: Position at ………………………. (date)

  18. And this! e-Safeguarding Action Plan Template

  19. E-Safeguarding Approaches Contact Details Neil Turner ICT Consultant Central Bedfordshire Council e-Learning Strategy Team Watling House High Street North Dunstable LU6 1LF Tel No: 0300 300 4897 neil.turner@centralbedfordshire.gov.uk

More Related