470 likes | 618 Views
Primary ICT E-safety Workshops 31 st Jan and 1 st Feb 2012. Agenda. Objectives. Keeping up with the Joneses SID resources 2012. What have you come to this e-safety workshop for? Have you, or the school, had issues with online safety. E-safety Review. http://www.surreyesafety.co.uk.
E N D
What have you come to this e-safety workshop for? Have you, or the school, had issues with online safety E-safety Review
http://www.surreyesafety.co.uk Surrey E-safety Website
E-safety documents Important for all other aspects of safeguarding www.surreycc.gov.uk Surrey Safeguarding Children Board
E-safety Toolkit Jan 2012 Draft Safe Practice with Technology now part of FAQs Important documents for schools
Updates -safer internet website • The Safer Internet Centre has been funded by the European Commission to provide a Helpline for professionals who work with children and young people in the UK, specifically tackling the area of e-safety. We provide support with all aspects of digital and online issues such as social networking sites, cyber-bullying, sexting, online gaming and child protection online. The Helpline aims to resolve issues professionals face about themselves, such as protecting professional identity and reputation, as well as young people in relation to online safety.
What has been reported • The Online Abuse of Professionals – Research Report from the UK Safer Internet Centre. Prof Andy Phippen, University of Plymouth. • Aug 2011 • 35% respondents said that either they, or their colleagues, have been subject to some form of online abuse. Abuse from pupils (72%) parents (26%) and other staff (12%).
Plymouth Council Survey Mar 2011 • A recent study, conducted by Plymouth Council, surveyed the internet habits of 423 under-fives, with an average age of four. • It found 305 used the internet every day, often unsupervised. • Whilst the survey indicated that the most popular sites were CBeebies and PeppaPig,Professor Tanya Byron, a clinical psychologist, said leaving a five-year-old unsupervised on the internet is equivalent to ‘abandoning a kid in a shopping centre for a couple of hours’. • If you work in an Early Years setting and want further information then why not take a look at:- • Plymouth's Early Years Toolkit.
Shipton Report CEIR Improving e-safety in primary schools: a guidance document • Useful review of where Primary schools are in relation to e-safety. • September 2011Centre for Education and Inclusion ResearchSheffield Hallam University
Ofsted Framework 2012 • Achievement of pupils at the school • Quality of teaching in the school • Behaviour and safety of pupils at the school • Quality of leadership in and management of the school = Overall effectiveness If one of the 4 is inadequate then overall effectiveness is inadequate
Criteria for Behaviour and Safety When evaluating the behaviour and safety of pupils at the school, inspectors must consider: • pupils’ attitudes to learning and conduct in lessons and around the school • pupils’ behaviour towards, and respect for, other young people and adults, including, for example, freedom from bullying and harassment that may include cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability • how well teachers manage the behaviour and expectations of pupils to ensure that all pupils have an equal and fair chance to thrive and learn in an atmosphere of respect and dignity • pupils’ ability to assess and manage risk appropriately and keep themselves safe • how well the school ensures the systematic and consistent management of behaviour.
How to evaluate – the range of evidence (judgements must not be made solely on the basis of what is seen during an inspection}: • Evidence for B&S may contributions to spiritual, moral, social and cultural • Types, rates and patterns of bullying…. including cyber-bullying • The extent to which pupils are able to understand and respond to risk, for example risks associated with extremism, new technology…
Translates into a grade descriptor for Outstanding of… Instances of bullying, including for example, cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability, are extremely rare. Pupils are acutely aware of different forms of bullying and actively try to prevent it from occurring. The school has an active and highly effective approach to identifying and tackling bullying. All groups of pupils feel safe at school at all times. They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe.
Leadership and management Outline guidance – inspectors should focus on how effective L&M overcomes barriers to learning, these are likely to include: • strategies and procedures, including the provision of appropriate guidance, to help pupils prepare for life in modern democratic Britain and a global society
Tuesday 7th February 2012 ‘Connecting generations and educating each other’, http://www.saferinternet.org Safer Internet Day 2012
What resources are available? • Resources available • Thinkuknow.co.uk SID day (requires registration) • Safer Internet Day website • Insafe website • Lesson plans • Banners/logo/posters/videos • ‘Keeping up with the Joneses’ (Thinkuknow.co.uk) • Assembly PowerPoint • SID radio • All web links available from SID page of Surrey e-safety website
What can schools do? • Register to connect with other schools http://www.saferinternetday.org/web/guest/school-registration • Organise an in-school e-safety event (assembly, after school event) • Open the event to parents, carers, grandparents, as well as young people • If possible, coordinate activities with other schools • Use the resources at a later time of the year
SWGfL e-safety self review tool Free to register May become costed Obtain an e-safety Mark £750 for assessment SWGfL 360̊̊̊ Safe
What’s new? E-safety Committee to include an E-safety Coordinator, a governor and the CPLO Education and CPD - Staff CPD (inc governors), Students curriculum, Parent meetings E-safety Risks Internet Social networking, IM, VC, chat, email, blogging VLEs Gaming Mobile phones and handheld technology File sharing Filtering Data handling Pupil Groups and Pupils with Additional Needs
Where to start… E-safety Audit
What your school can do next… • Identify any gaps in the schools’ e-safety provision • Update policies where necessary • Ensure training is made available for all • Ensure that all staff are aware of your schools response procedures – e.g.do they know who is on the e-safety committee? Does the e-safety coordinator have a log book for e-safety incidents?
Updated Surrey E-Safety SoW • Maps out e-safety progression • Incorporates e-safety resources • Recognises links to PSHCE/ICT
Latest teaching resources Smartie the Penguin http://kidsmart.org.uk Aimed at 3-7 years.
SEN Resources • ‘Know Your Friends with Josh and Sue’ • 5 minute animation for KS2 • 3 versions created inc. audio only. • www.thinkuknow.co.uk
Further E-Safety Resources Hector’s World
Resources to support E-Safety-themed days or weeks • Intended to support E-Safety themed days or weeks. • Can be used for assemblies or group-based activities. • Ideas for using on and offline resources.
Where do I find them? • From E-Safety home page, click on Curriculum tab.
Data Handling Update • Session builds on guidance developed by Becta and shared at last year’s events • Set in the context of your school’s legal responsibility to keep personal data safe and secure • Development of guidance for Surrey schools in relation handling information and data • There is a clear link between sound e-safety policies and practice with effective data handling
Data Handling Update Guidance includes the following: • Key actions for schools • Golden rules for staff • Managing passwords • Avoiding unauthorised access to data and information
Key Actions for Schools • Be aware of your responsibilities in relation to ensuring data and information is secure • Know what sensitive data and information is in the school and who has access to it • Ensure your school has policies, protocols in place, such as, a password policy • Consider the place of protective marking of data and information and encryption of ICT equipment
Include: Always keep your passwords secret Never access data unless you have a professional need to do so Always log off unattended PCs and laptops Never leave electronic equipment, such as laptop computers, or sensitive documents or papers in an unattended vehicle Always be aware of the sensitive nature of the data you are sending Ensure you double check who you are sending information to prior to sending Never hold data for longer than you need to and delete it when its use is no longer required Avoid the use of personal emails for professional use The Golden Rules for Staff
Passwords should consist of at least eight characters including a combination of capital letters, lower case letters and numbers Avoid creating passwords using: Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters, for example: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) Personal information, such as, your name, birthday, driver's licence, passport number, or similar information Passwords
To include: Use features within software, such as word to protect documents with passwords to prevent access Use your school’s learning platform to provide secure access to data and information Don’t click on links in unsolicited emails and only download files or programs from sources you trust Ask third parties how they will protect sensitive information once it has been passed to them Use encrypted portable storage devices Use encryption software on laptops to prevent access to files Keep your PCs and laptops up to date with the latest security updates Avoiding unauthorised access
Encryption is used to improve the security of a file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it Encryption is managed by changing plain text into mathematical logic, or algorithms Whole drives or disks can encrypted or just specific files and folders Encryption
www.surreycc.gov.uk/safeguarding For e safety in guidance and protocols section Use of emails Information on SNet Including information of passwords Sources of Guidance
Safeguarding Software • Lots of Monitoring companies • 4S have worked with Securus for 10 years • Many Secondary schools use the Securus solution in their school. • Some Primaries also have take it up. • Securus have worked with a server based company Redstor, already known in Surrey, to provide a remote solution for Primary schools. • Babcock 4S have worked with Redstor to create a price point that is practicable for schools.
Primary Securus Solution Operated by Redstor • Computer monitoring software, installed on school computers, identifies a wide range of e-safety issues within online and offline applications.. • Can have a AUP when first login • Screenshot taken of any concern to show the context of what took place and who was involved. • Requires oversight by senior leader • KS1 get it for free in a primary school • Reception/ KS1 not sold to on own
Cost for Surrey Schools • Price per pupil = £2.74 Minimum per school £228 • Optional additional cost for installation and Training = £500 per school