E-Safety Conference 2014

57
E-Safety Conference 2014

description

E-Safety Conference 2014. Aims. To raise awareness and give an overview of the emerging e-safety agenda from a schools perspective. Allow schools to evaluate where they are and allow them to signpost next steps. Highlight support available to schools. Schedule. - PowerPoint PPT Presentation

Transcript of E-Safety Conference 2014

Page 1: E-Safety Conference 2014

E-Safety Conference 2014

Page 2: E-Safety Conference 2014
Page 3: E-Safety Conference 2014

Aims

• To raise awareness and give an overview of the emerging e-safety agenda from a schools perspective.

• Allow schools to evaluate where they are and allow them to signpost next steps.

• Highlight support available to schools.

Page 4: E-Safety Conference 2014

Schedule

• 9:00 – 9:15 Coffee and registration• 9:15 – 9:20 Welcome• 9:20 – 9:40 What does an E-Safe school look like?• 9:40 – 10:15 Keynote: Simon Finch • 10:15 – 10:45 Workshop: How acceptable is your “

Acceptable Use Policy”?• 10:45 – 11:00 Coffee break• 11:00 – 11:15 E-safety and the new Computing Curriculum• 11:15 – 11:30 OFSTED and E-safety – What are they

looking for?• 11:30 – 11:50 Key Bytes!!!• 11:50 – 12:10 Group feedback. • 12:10 – 12:30 Next steps.

Page 5: E-Safety Conference 2014

What does an E-Safe School look like?

Page 6: E-Safety Conference 2014

Feedback - An E- Safe school is…

Page 7: E-Safety Conference 2014

Feedback - what does an e-safe school look like?

• Whole school awareness• Techy stuff – forensic monitoring, infrastructure,

anti-virus• Safeguarding – cyber bullying• Curriculum - teaching and Learning – Everybody• Policies – AUP, E-safety ( everybody should

understand this)• National Events and groups e.g. CEOP• Procedures for managing social media, logging

incidents

Page 8: E-Safety Conference 2014

Keynote – Simon Finch

Page 9: E-Safety Conference 2014

Workshop

How acceptable is your “Acceptable Use Policy”?

Page 10: E-Safety Conference 2014

Scenario 1

Miss Peach borrows a school iPad and laptop which she takes home. When she is not using it for school work she uses it for personal use.

Page 11: E-Safety Conference 2014

Scenario 2

Sergeant Grey is taking his group on the annual trip to Beamish.

He has forgotten the school camera but has his own phone which has a camera attached. He uses this to take pictures. He downloads them to the school network as soon as he gets back.

Page 12: E-Safety Conference 2014

Scenario 3

Ms Gold has had a bad day at school. When she gets home she adds a status to Friendbook to say so.

Page 13: E-Safety Conference 2014

Scenario 4

Professor Plum has spare time at lunchtimes and uses a school machine to research and book his holiday for half term.

Page 14: E-Safety Conference 2014

Scenario 5

Colonel Mustard retired last term. The school have left his school accounts and e mail active for a month so he can organise his affairs.

Page 15: E-Safety Conference 2014

Scenario 6

Mrs White is a disgruntled grandparent and has commented on Friendbook to air a grievance. She has named a teacher at her grandchild’s school. Others have commented on her post. News has spread around the playground!

Page 16: E-Safety Conference 2014

Scenario 7

Dr Black intends to finish his reports at home because he said he had too much to do in school. He will bring the finished documents back in to school and load onto the school network on a memory stick.

Page 17: E-Safety Conference 2014

Scenarios Feedback

• NO! He shouldn’t use his phone - this is to protect himself and the students

• Simon disagreed. AUP should be acceptable and enable you to do your job properly

• Ian – consider the audience of images and where to store them

• Don’t do it• Context of the bad day – at work or at school?• Why is there a need to do it?• People have a need to be social

• Personal use not a family computer• Caution with personal banking etc.• Staff access monitored and filtered by VPN• No – have no control over what doing at home

Page 18: E-Safety Conference 2014

Scenarios Feedback

• Not a problem it is staff personal time• Often heads discretion rather than documented• Monitoring would be in place• Staff should be made aware of what is ‘acceptable’

• Organise his affairs before he leaves• Down to heads discretion some allow restricted access

for users after leaving who are still supporting the school in some way

• Staff access should be disabled immediately

• Can involve police• Legally what can we do? Legal advice has been sought • Need to educate parents re social media

Page 19: E-Safety Conference 2014

Scenarios Feedback

• If encrypted• Use remote access or VLE for reports• Minimise risks• Is e-mail safer?• Is email secure – e.g. council advises that sensitive

information should not be sent by email

Page 20: E-Safety Conference 2014
Page 21: E-Safety Conference 2014

New Curriculum

Implementation September 2014.

The curriculum subject is now called Computing.

This continues to incorporate all the facets of the subject, including:•computer science •digital literacy •information technologies.

A major inclusion is that of E-safety

Page 22: E-Safety Conference 2014

Aims

• can understand and apply the fundamental principles and concepts of computer science, including abstraction, logic, algorithms and data representation

• can analyse problems in computational terms, and have repeated practical experience of writing computer programs in order to solve such problems

• can evaluate and apply information technology, including new or unfamiliar technologies, analytically to solve problems

• are responsible, competent, confident and creative users of information and communication technology

Page 23: E-Safety Conference 2014

Subject contentKey Stage 1

Pupils should be taught to:•understand what algorithms are; how they are implemented as programs on digital devices; and that programs execute by following precise and unambiguous instructions•create and debug simple programs•use logical reasoning to predict the behaviour of simple programs•use technology purposefully to create, organise, store, manipulate and retrieve digital content•use technology safely and respectfully, keeping personal information private; know where to go for help and support when they have concerns about material on the internet•recognise common uses of information technology beyond school

Subject contentKey Stage 1

Page 24: E-Safety Conference 2014

Key Stage 2Pupils should be taught to:•design, write and debug programs that accomplish specific goals, including controlling or simulating physical systems; solve problems by decomposing them into smaller parts•use sequence, selection, and repetition in programs; work with variables and various forms of input and output•use logical reasoning to explain how some simple algorithms work and to detect and correct errors in algorithms and programs•understand computer networks including the internet; how they can provide multiple services, such as the world-wide web; and the opportunities they offer for communication and collaboration•use search technologies effectively, appreciate how results are selected and ranked, and be discerning in evaluating digital content•use technology safely, respectfully and responsibly; know a range of ways to report concerns and inappropriate behaviour•select, use and combine a variety of software (including internet services) on a range of digital devices to accomplish given goals, including collecting, analysing, evaluating and presenting data and information.

Subject contentKey Stage 2

Page 25: E-Safety Conference 2014

• design, use and evaluate computational abstractions that model the state and behaviour of real-world problems and physical systems

• understand several key algorithms that reflect computational thinking [for example, ones for sorting and searching]; use logical reasoning to compare the utility of alternative algorithms for the same problem

• use two or more programming languages, at least one of which is textual, to solve a variety of computational problems; make appropriate use of data structures [for example, lists, tables or arrays]; design and develop modular programs that use procedures or functions

• understand simple Boolean logic [for example, AND, OR and NOT] and some of its uses in circuits and programming; understand how numbers can be represented in binary, and be able to carry out simple operations on binary numbers [for example, binary addition, and conversion between binary and decimal]

• understand the hardware and software components that make up computer systems, and how they communicate with one another and with other systems

• understand how instructions are stored and executed within a computer system; understand how data of various types (including text, sounds and pictures) can be represented and manipulated digitally, in the form of binary digits

• undertake creative projects that involve selecting, using, and combining multiple applications, preferably across a range of devices, to achieve challenging goals, including collecting and analysing data and meeting the needs of known users

• create, re-use, revise and re-purpose digital artefacts for a given audience, with attention to trustworthiness, design and usability

• understand a range of ways to use technology safely, respectfully, responsibly and securely, including protecting their online identity and privacy; recognise inappropriate content, contact and conduct and know how to report concerns.

Subject contentKey Stage 3

Page 26: E-Safety Conference 2014

• All pupils must have the opportunity to study aspects of information technology and computer science at sufficient depth to allow them to progress to higher levels of study or to a professional career.

All pupils should be taught to: • develop their capability, creativity and knowledge in computer

science, digital media and information technology • develop and apply their analytic, problem-solving, design, and

computational thinking skills • understand how changes in technology affect safety, including

new ways to protect their online privacy and identity, and how to identify and report a range of concerns.

Subject contentKey Stage 4

Page 27: E-Safety Conference 2014

What does it mean in school?

Year 1 Make an avatar using a paint program and display in school.

Year 2 Make a cover for a game with PEGI rating on it.

Year 3 Make a database of favourite games.

Year 4 Make a helpsheet for frequently used abbreviations in textspeak.

Year 5 Comment on others work using learning platform or another secure site.

Year 6 Create a website or blog including video, images and sounds.

Page 28: E-Safety Conference 2014

Website Resources

Page 29: E-Safety Conference 2014

OFSTED

Page 30: E-Safety Conference 2014

Schools ability…

to protect and educate pupils and staff in their use of technology.

to have the appropriate mechanisms to intervene and support any incident where appropriate.

Page 31: E-Safety Conference 2014

Breadth of issues within E safety

The breadth of issues classified within e-safety is considerable, but can be categorised into three areas of risk:•content: being exposed to illegal, inappropriate or harmful material•contact: being subjected to harmful online interaction with other users •conduct: personal online behaviour that increases the likelihood of, or causes, harm.

Page 32: E-Safety Conference 2014

Key features of good and outstanding practice

• Whole School Consistent Approach• Robust and integrated reporting routines• Staff• Policies• Education• Infrastructure• Monitoring and Evaluating• Management of personal data

Page 33: E-Safety Conference 2014

Whole school consistent approach

• All teaching and non-teaching staff can recognise and are aware of e-safety issues.

• High quality leadership and management make e-safety a priority across all areas of the school (the school may also have achieved a recognised standard, for example the e-Safety Mark).

• A high priority given to training in e-safety, extending expertise widely and building internal capacity.

• The contribution of pupils, parents and the wider school community is valued and integrated.

Page 34: E-Safety Conference 2014

Robust and integrated reporting routines

• School-based reporting routes that are clearly understood and used by the whole school, for example online anonymous reporting systems.

• Report Abuse buttons, for example CEOP. Clear, signposted and respected routes to key members of staff. Effective use of peer mentoring and support.

Page 35: E-Safety Conference 2014

Staff

• All teaching and non-teaching staff receive regular and up-to-date training.

• One or more members of staff have a higher level of expertise and clearly defined responsibilities.

Page 36: E-Safety Conference 2014

Policies

• Rigorous e-safety policies and procedures are in place, written in plain English, contributed to by the whole school, updated regularly and ratified by governors.

• The e-safety policy should be integrated with other relevant policies such as behaviour, safeguarding and anti-bullying.

• The e-safety policy should incorporate an Acceptable Usage Policy that is understood and respected by pupils, staff and parents.

Page 37: E-Safety Conference 2014

Education

• An age-appropriate e-safety curriculum that is flexible, relevant and engages pupils’ interest; that is used to promote e-safety through teaching pupils how to stay safe, how to protect themselves from harm and how to take responsibility for their own and others’ safety.

• Positive rewards are used to cultivate positive and responsible use.

• Peer mentoring programmes.

Page 38: E-Safety Conference 2014

Infrastructure

• Recognised Internet Service Provider (ISP) or Regional Broadband Consortium (RBC) together with age-related filtering that is actively monitored.

Page 39: E-Safety Conference 2014

Monitoring and Evaluation

• Risk assessment taken seriously and used to good effect in promoting e-safety.

• Using data effectively to assess the impact of e-safety practice and how this informs strategy.

Page 40: E-Safety Conference 2014

Management of Personal Data

• The impact level of personal data is understood and data is managed securely and in accordance with the statutory requirements of the Data Protection Act 1998.

• Any professional communications between the setting and clients that utilise technology should:

• take place within clear and explicit professional boundaries

• be transparent and open to scrutiny• not share any personal information with a child or

young person.

Page 41: E-Safety Conference 2014

Indicators of Inadequate Practice

• Personal data is often unsecured and/or leaves school site without encryption.

• Security of passwords is ineffective, for example passwords are shared or common with all but the youngest children.

• Policies are generic and not updated.• There is no progressive, planned e-safety education

across the curriculum, for example there is only an assembly held annually.

• There is no internet filtering or monitoring.• There is no evidence of staff training.• Children are not aware of how to report a problem.

Page 42: E-Safety Conference 2014

Ofsted Questions to School Leadership

• How do you ensure that all staff receive appropriate online safety training that is relevant and regularly up to date?

• What mechanisms does the school have in place to support pupils and staff facing online safety issues?

• How does the school educate and support parents and whole school community with online safety?

Page 43: E-Safety Conference 2014

Ofsted Questions to School Leadership

• Does the school have e-safety policies and acceptable use policies in place? How does the school know that they are clear and understood and respected by all?

• Describe how your school educates children and young people to build knowledge, skills and capability when it comes to online safety? How do you assess its effectiveness?

Page 44: E-Safety Conference 2014

Ofsted Questions to pupils

• If you felt uncomfortable about anything you saw, or if anybody asked you for your personal details such as your address on the internet would you know where to go for help?

• If anybody sent you hurtful messages on the internet or on your mobile phone would you know who to tell?

• Can you tell me one of the rules your school has for using the internet?

• Can you describe the risks of posting inappropriate content on the internet?

Page 45: E-Safety Conference 2014

Sample Questions for staff• Have you had any training that shows the risks to your and pupils online safety?

• Are there policies in place that clearly demonstrate good and safe internet practice for staff and pupils?

• Are there sanctions in place to enforce the above policies?

• Do all staff understand what is meant by the term cyber-bullying and the effect it can have on themselves and pupils?

• Are their clear reporting mechanisms with a set of actions in place for staff or pupils who feel they are being bullied online?

• Does the school have any plans for an event on Safer Internet Day? (This is an annual event, now in its fifth year at least, so schools that participate will know about the event).

Page 46: E-Safety Conference 2014

Key Bytes

Page 47: E-Safety Conference 2014

How to deal with an incident

Page 48: E-Safety Conference 2014

E-Safety Competition

Page 49: E-Safety Conference 2014

CPD Courses

Digital Footprint

5th and 12th March 2014

28th Jan and 4th Feb 2014

11th February 2014

Page 50: E-Safety Conference 2014

Data Security Policy

Information and ICT Security Policy

Available for reuse on www.ictinschools.org

Page 51: E-Safety Conference 2014

Monitoring Solutions

Page 52: E-Safety Conference 2014

Filtering Changes

Page 53: E-Safety Conference 2014

E Safe @ Home

Page 54: E-Safety Conference 2014

Healthy Schools E-Safety

• ICT in Schools are in partnership with Healthy Schools team• There is a new strand to healthy schools where schools target

specific and meaningful well being priorities in order to improve outcomes for young people.

• One of the 7 is e-safety where the school identifies that they would like to target e safety and become a specialist school in that area. They would receive an award and a plaque to illustrate the schools commitment to e safety issues (Ofsted!)

• Launch date September 2014• Contact [email protected]• Briefing meeting Thursday 30th January @ OpenZone CLC from

4-5.30pm

Page 55: E-Safety Conference 2014

Over to you…

Page 56: E-Safety Conference 2014

Feedback

Page 57: E-Safety Conference 2014

Next Steps