e safety info
TRANSCRIPT
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 1/32
E-Safety.
What do we understand e-safety to
mean?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 2/32
E-Safety.E-Safety covers, but is not limited to«..
Child protection
Cyber bullying
Grooming
Unintentional attack. (Virus/malware)
Intentional abuse/attack
Intentional misuse of facilities or equipment
Wireless and hardwired networks
Data Transfer
Use of memory sticks
Downloads
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 3/32
E-Safety.
Plus a range of threats not yet invented!
Above all, e-safety is a PSHE matter NOT
and ICT matter
(although it clearly has implications for
systems and their management)
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 4/32
E-Safety.
Schools should have a designated e-safety
officer.
(Could be the school child-protection officer)
Impress upon all staff that e-safety is NOT an
ICT issue alone, or a technical issue, although it
touches on both.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 5/32
E-Safety.
We have to have in place an e-Safety policy
that teaches safe practices to children and sets
out clear expectations for parents, carers and
staff.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 6/32
E-Safety.Intentional or accidental?
A child types in a perfectly harmlessgoogle search. Unfortunately, it yields an
image that is unacceptable in school
despite the filter.
What would you want your staff do youdo?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 7/32
E-Safety.Intentional or accidental?
A child types in a deliberate attempt toaccess unacceptable material.
Unfortunately, it yields an image that is
unacceptable in school despite the filter.
What would you want your staff to do?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 8/32
E-Safety.Do you have a clear ³flight plan´ that can
be followed by all staff in the event of a
breach of e-safety?
Would they be clear about what to do in
the absence of the Head Teacher or
Deputy?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 9/32
E-Safety.Records.
Keeping writes of wrongs.
What do you need to record?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 10/32
E-Safety.Worst case scenario.
What IS the worst case scenario?
(Discuss)
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 11/32
E-Safety.Home/school partnership.
How can we help parents to stay safeand help with keeping school systems
safe?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 12/32
E-Safety.Key problems found in the home
1) PC in a ³private´ place
2) Social networking sites3) Unsecured wireless networks
4) ISP child controls not active
5) No or ineffective anti virus/malware
protection.6) A culture of ³don¶t tell´
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 13/32
E-Safety.³There is no problem with e-safety in
my house. I always check my child¶s
interneth
istory folder«..
«.it is always empty´
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 14/32
E-Safety.Key messages for e-safety policies
An expectation of high standards of
vigilanceA culture of ³It¶s ok to tell.´
Promulgation of the fact to those who
would abuse th
e system th
at th
ey willhave nowhere to hide.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 15/32
E-Safety.Devil in the detail.
No sharing of logons
Virus check all files before uploading
Clear links between E-safety policy anddiscipline policies. Actions have
consequences.
Handouts for parents re e-safety in thehome
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 16/32
E-Safety.Devil in the detail.
Sharing of information and support.
A clear understanding of when to involve
outside agencies A clear knowledge of reporting
procedures
A clear understanding of preserving theevidence trail
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 17/32
E-Safety.Data in Transit
What do you take home?
How?Why?
When?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 18/32
E-Safety.Data in Transit
Do you know what do your staff take
home?
How?Why?
When?
A quote from a network manager
³ I have no idea what data my staff take
off site«.or how.´
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 19/32
E-Safety.Data in Transit
Email. Secure or not?Do members of staff share any child
sensitive information via email?
Does your staff know how to encrypt
documents attached to emails?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 20/32
E-Safety.Data in Transit
Encrypted memory sticks. Safe as long as
the encryption key is not printed or writtenon them! (Yes, this has happened!)
Hardware protection is better than
software protection.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 21/32
E-Safety.Data in Transit
How often does information need to be
taken off site?Does the SMT know who/how/when this
happens?
The school is the Data Controller under
the Data Protection Act.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 22/32
E-Safety.How to avoid the News of the World
What is the school password policy?
Are any passwords guessable?How often do you require them to be
changed?
What about supply teachers?
How often do you regularly ³monitor andreview´«. (come on.. really how often?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 23/32
E-Safety.Becta guidance speaks of..
³«an effective range of technological
tools«´
RM provide and internet filter
Securus
Proxy CacheWhat else?
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 24/32
E-Safety.The doctrine of ³reasonable care´
It is expected that schools will take ³all
reasonable precautions´ to protect.
Reasonable care = ³The degree of care
that a reasonably prudent person would
use under like circumstances´
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 25/32
E-Safety.Involve everyone.
A working group to discuss what e-safety
will look like at your school.Governors,
Staff
Parents
Children/students
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 26/32
E-Safety.Involve everyone.
Make sure that the ³non-negotiables´ are
not softened just because they may beuncomfortable to discuss
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 27/32
E-Safety.Involve everyone.
Remember that many people will be
uncomfortable discussing this« it canlead to ³the dark side of the Force´
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 28/32
E-Safety.Involve everyone.
Parents may be particularly anxious.
You should be able to offer them generaladvice for e-safety in the home, or point
them to the Becta website.
You cannot become responsible for their
home PC systems.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 29/32
E-Safety.What can you do in school
Make sure you have an Acceptable Use
policy, signed up to by all your schoolcommunity.
Ensure your anti-bullying policy refers to
cyber bullying.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 30/32
E-Safety.What can you do in school
Designate a senior management team
member with responsibility for safeguarding to also be the central
contact point for all e-safety issues.
(E-safety is a child protection issue, NOT
an ICT issue)
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 31/32
E-Safety.What can you do in school
Listen to your instincts and do not let it go
until you are happy that you have arobust, enforceable, policy and measures
in place to monitor it.
8/6/2019 E Safety Info
http://slidepdf.com/reader/full/e-safety-info 32/32
E-Safety.What can you do in school
Review Review Review.
Acceptable Use and e-Safety policiesbecome more important as we explore
connected learning.
Threats and abuses are organic. Your
policies need reviewing annually.