SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school...
Transcript of SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school...
1 | P a g e
SEAHAM HIGH SCHOOL
E Safety Policy
Adopted By: Policy Committee on behalf of
Governing Body
Signed:
Chair of Governors – Mr D Wilkinson
On: 22nd October 2014
Review By: October 2016
2 | P a g e
E-safety policy
Internet technology helps pupils learn creatively and effectively. It encourages
collaborative learning and the sharing of good practice amongst all school stakeholders.
The e-safety policy encourages appropriate and safe conduct and behaviour during this
process.
Pupils, staff and all other users of school-related technologies will work together to
agree standards and expectations relating to usage in order to promote and ensure
good behaviour.
These agreements and their implementation will promote positive behaviour at school.
This can transfer directly into each pupil’s adult life and prepare them for experiences
and expectations in the workplace. The policy is not designed to be a blacklist of
prohibited activities; it is a list of areas to discuss, teach and inform. It will develop
positive behaviour and knowledge leading to safer internet use and year-on-year
improvement, with a measurable impact on e-safety. The positive effects of the policy
are intended to be seen online and offline in school and at home, and ultimately beyond
school and into the workplace.
Introduction
1.1 Ofsted statements:
Ofsted have defined e-safety thus:
• ‘In the context of an inspection, e-safety may be described as the school’s ability to protect and educate pupils and staff in their use of technology and to have the appropriate mechanisms to intervene and support any incident where appropriate.’
E-safety will be inspected in relation to the following areas:
• “The behaviour and safety of pupils at the school.
• The quality of leadership in, and management of, the school”
Ofsted have identified three areas of e-safety risk in relation to pupils:
• “Being exposed to illegal, inappropriate or harmful material.
• Being subjected to harmful online interaction with other users.
• Personal online behaviour that increases the likelihood of, or causes, harm.”
An outstanding school will demonstrate that:
• “All groups of pupils feel safe at school and at alternative provision placements at all times. They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe, including in relation to e-safety.”
Ofsted will examine how the school:
• Audits the training needs of all staff and provides training to improve their knowledge of and expertise in the safe and appropriate use of new technologies.
3 | P a g e
• Works closely with all families to help them ensure that their children use new technologies safely and responsibly both at home and at school.
• Uses pupils’ and families’ views more often to develop e-safety strategies.
• Manages the transition from locked down systems to more managed systems to help pupils understand how to manage risk; to provide them with richer learning experiences; and to bridge the gap between systems at school and the more open systems outside school.
• Provides an age-related, comprehensive curriculum for e-safety that enables pupils to become safe and responsible users of new technologies.
• Works with partners and other providers to ensure that pupils who receive part of their education away from school are e-safe.
• Systematically reviews and develops e-safety procedures, including training, to ensure that they have a positive impact on pupils’ knowledge and understanding.
• Ensure pupils are aware of e-safety reporting procedures in school.
Key features of good and outstanding practice:
• All staff understand e-safety issues. e-safety is a school priority. The school has, or is working towards an e-safety Mark. Training in e-safety is audited and provided to all staff. A number of members of staff have received accredited e-safety training. Pupils, parents, wider school community stakeholders and governors all contribute to build a fluid and constantly evolving e-safety policy.
• Clear and transparent procedures exist for monitoring, logging, reporting incidents, evaluating, improving and measuring the impact of e-safety. All staff, parents, pupils, contractors and governors know how to report an e-safety incident.
• The school uses recognised and accredited providers for internet provision and filtering.
• The e-safety policy is closely integrated with relevant policies and procedures, including child protection, safeguarding, acceptable use, anti-bullying and behaviour.
• The acceptable use policy agreements have been developed with, signed by, and agreed to by all users of school IT systems – pupils, parents, staff, governors, visitors and external contractors.
• The school promotes a real world, responsible and positive outlook towards Digital Literacy and e-safety aimed at preparing pupils for expected standards of behaviour in adult life and the workplace.
• The school relies on government, DfE, National College for Teaching & Leadership, (formerly TA and also GTC) and ICO guidance and documentation with regard to Data Protection, data storage and privacy compliance.
E-safety policy scope
The school e-safety policy and agreements apply to all pupils, staff, support staff,
external contractors and members of the wider school community who use, have access
to, or maintain school and school-related internet and computer systems internally and
externally.
The school will make reasonable use of relevant legislation and guidelines to effect
positive behaviour regarding ICT and internet use on and off the school site. This will
include imposing rewards and sanctions for behaviour and penalties for inappropriate
behaviour as defined as ‘regulation of student behaviour’ under the Education and
Inspections Act 2006. ‘In loco parentis’ provision under the Children Act 1989 allows the
school to report and act on instances of cyber-bullying, abuse, harassment, malicious
communication and grossly offensive material. This includes reporting to the police,
social media websites, and hosting providers on behalf of pupils.
4 | P a g e
The e-safety policy covers the use of
• Mobile phones when used on the school site
• Pupils’ and staff’s personal ICT equipment when used in school and which makes
use of school networking, file-serving or internet facilities
• External access to internal school networking such as webmail, network access,
file-serving (document folders) and printing
• School-related external internet including, but not limited to, extranet, e-learning
platforms, blogs, social media websites
• School-based intranet and networking
• School-based ICT systems and equipment
• Any device that connects to the school internet or network.
• Use of remote desktop and school equipment from outside of Seaham High
School
2.0 Reviewing your e-safety policy
Reviewing and evaluating e-safety and ensuring good practice – introduction
E-safety policy results from a continuous cycle of evaluation and review based on new
initiatives and partnership discussion with stakeholders and outside organisations,
technological and internet developments, current Government guidance and school-
related e-safety incidents. The policy development cycle develops good practice within
the teaching curriculum and wider pastoral curriculum. Regular assessment of strengths
and weaknesses helps to determine inset provision for staff and governors and
guidance for parents, pupils and local partnerships.
The e-safety committee will actively monitor and evaluate the e-safety policy. This
committee will comprise:
• Child protection officer Mrs L Whitehead
• Pupils, e.g. a member of the student council refer to document
• Community stakeholders, e.g. nurseries, youth groups, sports clubs, faith
groups/representatives refer to document
• Parents and guardians, e.g. PTA, parent governors, looked-after children/social
care representatives refer to document
• Governor(s) refer to document
• External IT contractors, e.g. web developer, e-learning provider Durham ITSS
• ICT technical support and network manager Mr D Hebdon
• In the event of an e-safety incident, the following people will be informed within
school and in external agencies and stakeholder organisations. Mrs L Whitehead
& Mr D Langlands
• Teaching staff refer to document
• Head teacher and school leadership team Mr David Shield & SLT
• E-safety co-ordinator/officer Mr David Langlands
5 | P a g e
In the event of an e-safety incident, the following people will be informed within school
and in external agencies and stakeholder organisations. Mrs L Whitehead & Mr D
Langlands
When will your e-safety policy and acceptable use policies be reviewed?
• At or prior to the start of each academic year
Additionally, the policy will be reviewed promptly upon:
• Advice from the police
• E-safety incidents in the community or local schools which might impact on the
school community
• Significant changes in technology as used by the school or pupils in the wider
community
• New guidance by Government/LEA/safeguarding authorities
• Serious and/or frequent breaches of the acceptable internet use policy or other in
the light of e-safety incidents
Where will the e-safety policy review be documented?
• School CLG
• In the school development plan
• School self evaluation and improvement profiling
This provision will be evidenced in the following school document(s): School CLG
'Staffroom - Policies'
The school will draw up an e-safety calendar detailing training, meetings, reviews,
evaluations, teaching and learning provision, parental involvement, wider community
involvement and governor involvement over an academic year.
• This provision will be evidenced in the following school document(s):
webcals://cid-fa70d8e3998a3e89.calendar.live.com/calendar/private/ac2139b4-
52f2-4327-8c4d-6a94c8bc88cb/d477bbd8-ab63-4a98-9532-
c017195baed6/calendar.ics
Staff, parent and pupil e-safety audits and pupil questionnaires will inform e-safety
learning and staff training requirements. This will gauge the impact and effectiveness of
the e-safety provision and determine future e-safety targets.
• This provision will be evidenced in the following school document(s): N:/eSafety
2.1 Policy review schedule
• This policy was approved by The Policy Committee - Governing Body on October
2014. It is stored here: Staffroom Policies - CLG and is published for viewing by
parents and the wider school community here: www.seahamschool.com.
• The e-safety policy will be monitored annually. The next review date is: 1st
September 2015.
6 | P a g e
• The e-safety policy will be reviewed and evaluated promptly in the light of serious
e-safety incidents. The last recorded serious e-safety incident was on N/A. As a
result this policy was reviewed on N/A.
• The e-safety policy will be reviewed and evaluated promptly in the light of
important changes to legislation or Government guidance related to e-safety. The
last recorded such change was on N/A and as a result this policy was reviewed
on N/A.
The e-safety committee and e-safety co-ordinator/officer will include evidence of
evaluations of the impact of the e-safety policy in reports. Such evidence includes (tick
the boxes you wish to include):
• ParentView and/or Ofsted questionnaire results
• E-safety audits of staff, support staff, parents, governors and other stakeholders
• AfL teaching questionnaires
• Logs of internet and network traffic activity
• Statistics of filtering breaches
• Contemporaneous written reports
The governing body/proprietor will receive a report on the progress, evaluation, impact
and effectiveness of the e-safety policy annually & when a serious esafety issue arises.
This report will include suitably redacted e-safety incident accounts and statistics,
detailing how they have been resolved, and the counter measures that were
implemented.
3.0 Who does e-safety affect? Who is responsible for e-safety
and what are their roles?
3.1 School management and e-safety
School senior management is responsible for determining, evaluating and reviewing e-
safety policies. This encompasses teaching and learning, use of school IT equipment
and facilities by pupils, staff and visitors. It also includes agreed criteria for acceptable
use by pupils, school staff and governors of internet-capable equipment for school-
related purposes or in situations which will impact on the reputation of the school, and/or
on school premises.
E-safety provision is always designed to encourage positive behaviours and practical
real-world strategies for all members of the school and wider school community.
Management is encouraged to be aspirational and innovative in developing strategies
for e-safety provision which will deliver measurable success via a calendar of e-safety
provision. Management should clearly state e-safety targets with success criteria on the
school development plan.
Evidence base:
7 | P a g e
• Staff inset provision audit and record (School Network) N:/eSafety
• Regularly updated e-safety policy, child protection policy and logged and
evaluated e-safety incidents (School Network) N:/eSafety
• Minutes from e-safety-related meetings with staff, SLT, parents association,
governors and wider school community stakeholders (School Network)
N:/eSafety
• E-safety calendar webcals://cid-
fa70d8e3998a3e89.calendar.live.com/calendar/private/ac2139b4-52f2-4327-
8c4d-6a94c8bc88cb/d477bbd8-ab63-4a98-9532-c017195baed6/calendar.icsa
• School development plan (School Network) N:/eSafety
3.2 The school e-safety officer or co-ordinator
The school’s designated e-safety officer Mr D Langlands reports to the SLT and
governors and co-ordinates e-safety provision across the school and wider school
community. The committee liaises with SLT, the school’s designated child protection
officer and other senior managers as required.
The school e-safety officer has a specific job description and person specification
detailing the role, remit, qualifications and qualities required for the post. This
specification is updated according to the school cycle for reviewing job descriptions.
The school’s e-safety co-ordinator chairs the school e-safety committee which includes
representatives of the school SLT, teaching and support staff, governors, parents, pupils
and the wider school community including relevant local stakeholders. Currently the e-
safety committee comprises: ICT Department
The school e-safety committee meets regularly at intervals defined in the school’s e-
safety calendar. (School Network) N:/eSafety
3.3 E-safety co-ordinator job description
• The e-safety co-ordinator is responsible for promoting best practice in e-safety
within the wider school community, including providing and being a source of
information for parents and partner stakeholders.
• Although all staff are responsible for upholding the school e-safety policy and
implementing safer internet practice, are responsible for monitoring internet use
by pupils and staff onsite, and on school machines such as laptops used off-site.
• The school e-safety co-ordinator audits and assesses inset requirements for staff,
support staff and governor e-safety training, ensuring that all staff are aware of
their responsibilities and the school’s e-safety procedures. The co-ordinator is the
first port of call for staff requiring advice on e-safety matters. (School Network)
N:/eSafety
• The school e-safety co-ordinator maintains a log of submitted e-safety reports
and incidents. (School Network) N:/eSafety
• The school e-safety co-ordinator is responsible for e-safety issues on a day-to-
day basis and liaises with LA contacts, filtering and website providers, and school
ICT support.
8 | P a g e
The school’s e-safety co-ordinator chairs the school e-safety committee which includes
representatives of the school SLT, teaching and support staff, governors, parents, pupils
and the wider school community including relevant local stakeholders. The co-ordinator:
• Is responsible for monitoring, reporting and evaluating incidences of inappropriate
internet use.
• Is the first point of contact in an e-safety incident and is responsible for monitoring
and reviewing e-safety incident logs.
• Is responsible for acting as a point of contact for support and advice on e-safety
issues.
• Is responsible for promoting e-safety awareness for parents and wider
stakeholders.
• Is responsible for ensuring e-safety is embedded in the curriculum, e.g. in
schemes of work, assemblies and themed weeks.
• Is responsible for ensuring staff receive information about current trends.
• Is responsible for managing e-safety training for all staff. (School Network)
N:/eSafety
• Is responsible for ensuring acceptable use policies/school internet rules are in
place, agreed by staff, pupils and parents and are monitored, evaluated and
reviewed.
• Is responsible for ensuring the e-safety policy is adhered to.
• Is responsible for ensuring that the e-safety policy links with other appropriate
school policies, e.g. anti-bullying, child protection, ICT, PSHE.
• Is responsible for evaluating and reviewing the school’s e-safety policy, updating
at least annually.
• Is responsible for promoting a school and community-wide e-safety culture and
promoting the school’s e-safety vision to all stakeholders.
• Is responsible for completing regular e-safety audits and maintaining the e-safety
calendar in conjunction with the senior leadership team and/or head.
3.4 Governors’ responsibility for e-safety - ICT support staff and external
contractors
The governing body has joint responsibility for e-safety. The safety committee will
compromise of ICT network manager, Mr D Langlands and the Governing Body
including the Head Teacher. The school e-safety officer/co-ordinator will liaise directly
with the governing body about reports on e-safety effectiveness, incidents, monitoring,
evaluation and developing and maintaining links with local stakeholders and the wider
school community.
9 | P a g e
3.5 Teaching and teaching support staff
Teaching and teaching support staff ensure that they are aware of the current school e-
safety policy, practices and associated procedures for reporting e-safety incidents.
Teaching and teaching support staff will be provided with an e-safety induction as part of
the overall staff induction procedures.
All staff must ensure that they have read, understood and signed (thereby indicating an
agreement) the acceptable use policies relevant to internet and computer use in school.
All staff must follow the school’s social media policy regarding external off-site use,
personal use (being mindful of bringing the school into disrepute), possible contractual
obligations, and conduct on internet school messaging or communication platforms, e.g.
email, VLE messages and forums and the school website.
All teaching staff must rigorously monitor pupil internet and computer use in line with the
policy. This includes the use of personal technology such as cameras, phones and other
gadgets on the school site.
Teaching staff should promote best practice regarding avoiding copyright infringement
and plagiarism.
Internet use and suggested websites should be pre-vetted and documented in lesson
planning.
3.6 Child protection officer
The Child Protection Officer is able to differentiate which e-safety incidents are required
to be reported to CEOP, local police, LADO, social services and parents/guardians. The
individual will also determine whether the information from such an incident should be
restricted to nominated members of the leadership team.
The child protection officer knows how to deal appropriately with incidents including (but
not limited to):
• Allegations against members of staff
• Computer crime, e.g. hacking of school systems
• Allegations or evidence of ‘grooming’
• Allegations or evidence of cyber bullying in the form of threats of violence,
harassment or a malicious communication.
The Child Protection Officer is responsible for acting ‘in loco parentis’ and liaising with
websites and social media platforms such as Twitter and Facebook to remove instances
of illegal material or cyber-bullying
3.7 Pupils
Pupils are required to use school internet and computer systems in agreement with the
terms specified in the school’s acceptable use policies. Pupils are expected to sign the
policy to indicate agreement, and/or have their parents/guardians sign on their behalf.
10 | P a g e
Pupils are aware of how to report e-safety incidents in school, and how to use external
reporting facilities, such as the CEOP report abuse button.
Pupils are aware that school acceptable use policies cover all computer, internet and
gadget usage in school, including the use of personal items such as phones.
Pupils are aware that their internet use out of school on social networking sites such as
Facebook is covered under the acceptable use policy if it impacts on the school and/or
its staff and pupils in terms of cyber-bullying, reputation or illegal activities.
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
3.8 Parents and guardians
It is hoped that parents and guardians will support the school’s stance on promoting
good internet behaviour and responsible use of IT equipment both at school and at
home.
The school expects parents and guardians to sign the school’s acceptable use polices,
indicating agreement regarding their child’s use and also their own use with regard to
parental access to school systems such as extranets, websites, forums, social media,
online reporting arrangements, questionnaires and the VLE.
Parents
The school will provide opportunities to educate parents with regard to e-safety,
including:
• Parents’ evenings, open days, transition evenings, or other events to take
advantage of occasions when there are large numbers of parents in school.
• E-safety information delivered to parents directly, including: letters, newsletters,
parentmail, website-subscribed news emails, the school extranet, learning
platform, website or VLE.
3.9 Guidance for other users
Other users such as school visitors, wider school community stakeholders or external
contractors are expected to agree to a visitor’s AUP document or a tailored AUP
document specific to their level of access and usage.
External users with significant access to school systems including sensitive information
or information held securely under the Data Protection Act should be DRB-checked.
This includes external contractors who might maintain the school domain name and web
hosting, which would facilitate access to cloud file storage, website documents and
email.
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
11 | P a g e
3.10 Wider school community and stakeholders
Possible information dissemination opportunities:
• Twilight courses or a series of presentations run by the school for parents and
wider school community stakeholders.
• Open days or other events to take advantage of occasions when there are large
numbers of visitors in school.
• E-safety information delivered to stakeholder directly, including: letters;
newsletters; website-subscribed news emails; school extranet; learning platform;
website; or VLE.
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
3.11 Staff – inset and training
E-safety information directly delivered to staff including: letters; newsletters; website-
subscribed news emails; school extranet; learning platform; website; or VLE.
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
A planned calendar programme of e-safety training opportunities to be made available
for staff including: on-site inset; whole staff training; online training opportunities (for
example NAACE courses); external CPD courses; accredited CPD courses (for example
cyber-mentors or CEOP); and co-ordinator training.
This provision will be evidenced in the following school documents: CPD Calendar
The e-safety policy will be updated and evaluated by staff at the beginning of each
academic year and timetabled into the INSET day schedule.
The e-safety co-ordinator/officer should be the first port of call for staff requiring e-safety
advice.
3.12 Governors – training
Possible training and information dissemination opportunities:
• Governors should also be given access to staff inset training and to specific
governor training provided externally (for example by the LEA, NAACE online or
the National Governors Association).
• Twilight courses or a series of presentations run by the school for parents and
wider school community stakeholders.
• Open days or other events to take advantage of occasions when there are large
numbers of visitors in school.
• E-safety information delivered to governors directly including: letters; newsletters;
website-subscribed news emails; school extranet; learning platform; website; or
VLE.
12 | P a g e
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
3.13 ICT support staff - contractors, filtering and monitoring
Possible training and information dissemination opportunities:
• IT technical support staff and network managers should have relevant industry
experience and Microsoft/Cisco-certified qualifications.
• Support staff and contractors need to be DRB-checked and agree to and sign the
school’s e-safety AUP.
• IT support staff and contractors should ensure that bought-in hardware and
software solutions feature built-in training provision.
• Support staff and contractors should also be given access to staff inset training
and specific governor training provided externally (for example by the LEA or
NAACE online).
• Twilight courses or a series of presentations run by the school for parents and
wider school community stakeholders.
• Open days or other events to take advantage of occasions when there are large
numbers of visitors in school.
• E-safety information delivered to support staff directly, including: letters;
newsletters; website-subscribed news emails; school extranet; learning platform;
website; or VLE.
This provision will be evidenced in the following school documents: (School Network)
N:/eSafety
4.0 Teaching and learning Why is Internet use important? 4.1 Seaham High School understands that:
• Internet use is part of the statutory curriculum and is a necessary tool for learning.
• The Internet is a part of everyday life for education, business and social interaction.
• The school has a duty to provide students with quality Internet access as part of their learning experience.
• Pupils use the Internet widely outside school and need to learn how to evaluate Internet information and to take care of their own safety and security.
• The purpose of Internet use in school is to raise educational standards, to promote pupil achievement, to support the professional work of staff and to enhance the school’s management functions.
• Internet access is an entitlement for students who show a responsible and mature approach to its use.
13 | P a g e
4.2 How does Internet use benefit education? Benefits of using the Internet in education include: ● access to worldwide educational resources including museums and art galleries; ● educational and cultural exchanges between pupils worldwide; ● vocational, social and leisure use in libraries, clubs and at home; ● access to experts in many fields for pupils and staff; ● professional development for staff through access to national developments,
educational materials and effective curriculum practice; ● collaboration across networks of schools, support services and professional
associations; ● improved access to technical support including remote management of networks and
automatic system updates; ● exchange of curriculum and administration data with DCC and DfE; ● access to learning wherever and whenever convenient. 4.3 How can Internet use enhance learning?
• The school’s Internet access will be designed to enhance and extend education.
• Pupils will be taught what Internet use is acceptable and what is not and given clear objectives for Internet use.
• The schools will ensure that the copying and subsequent use of Internet-derived materials by staff and pupils complies with copyright law.
• Staff should guide pupils to online activities that will support the learning outcomes planned for the pupils’ age and ability.
• Pupils will be educated in the effective use of the Internet in research, including the skills of knowledge location, retrieval and evaluation.
• Pupils will be taught to acknowledge the source of information used and to respect copyright when using Internet material in their own work.
5.0 Managing Information Systems 5.1How will information systems security be maintained?
• The security of the school information systems and users will be reviewed regularly.
• Virus protection will be updated regularly.
• The school will comply with the terms of the data protection act, and is responsible for registering with the information commissioner’s office . www.ico.gov.uk advice is available from www.ico.gov.uk/for_organisations/sector_guides/education.aspx
• Personal data sent over the Internet or taken off site will be encrypted.
• Portable media may not used without specific permission followed by an anti-virus / malware scan.
• Unapproved software will not be allowed in work areas or attached to email.
• Files held on the school’s network will be regularly checked.
• The ICT coordinator/network manager will review system capacity regularly.
• The use of user logins and passwords to access the school network will be enforced.
14 | P a g e
5.2 How will email be managed?
• Pupils may only use approved email accounts for school purposes. This will include the DCC CLG or Seaham High School Google Apps for Education account.
• Pupils must immediately tell a designated member of staff if they receive offensive email.
• Pupils must not reveal personal details of themselves or others in email communication, or arrange to meet anyone without specific permission from an adult.
• Staff will only use official school provided email accounts to communicate with pupils and parents/carers, as approved by the Senior Leadership Team.
• Access in school to external personal email accounts may be blocked.
• Excessive social email use can interfere with learning and will be restricted.
• Email sent to external organisations should be written carefully and authorised before sending, in the same way as a letter written on school headed paper would be.
• The forwarding of chain messages is not permitted.
• Schools will have a dedicated email for reporting wellbeing and pastoral issues. This inbox will be managed by designated and trained staff.
• Staff should not use personal email accounts during school hours or for professional purposes.
5.3 How will published content be managed?
• The contact details on the website should be the school address, email and telephone number. Staff or pupils’ personal information must not be published.
• The head teacher will take overall editorial responsibility for online content published by the school and will ensure that content published is accurate and appropriate.
• The school website will comply with the school’s guidelines for publications including respect for intellectual property rights, privacy policies and copyright.
5.4 Can pupils’ images or work be published?
• Images or videos that include pupils will be selected carefully and will not provide material that could be reused.
• Pupils’ full names will not be used anywhere on the website, particularly in association with photographs.
• Written permission from parents or carers will be obtained before images/videos of pupils are electronically published.
• Pupils work can only be published with their permission or the parents.
• Written consent will be kept by the school where pupils’ images are used for publicity purposes, until the image is no longer in use.
• The School will have a policy regarding the use of photographic images of children which outlines policies and procedures.
5.5 How will social networking, social media and personal publishing be managed?
• The school will control access to social media and social networking sites.
15 | P a g e
• Pupils will be advised never to give out personal details of any kind which may identify them and/or their location. Examples would include real name, address, mobile or landline phone numbers, school attended, IM and email addresses, full names of friends/family, specific interests and clubs etc.
• Staff wishing to use Social Media tools with students as part of the curriculum will risk assess the sites before use and check the sites terms and conditions to ensure the site is age appropriate. Staff will obtain documented consent from the Senior Leadership Team before using Social Media tools in the classroom.
• Staff official blogs or wikis should be password protected and run from the school website with approval from the Senior Leadership Team. Members of staff are advised not to run social network spaces for pupil use on a personal basis.
• Personal publishing will be taught via age appropriate sites that are suitable for educational purposes. They will be moderated by the school where possible.
• Pupils will be advised on security and privacy online and will be encouraged to set passwords, deny access to unknown individuals and to block unwanted communications. Pupil will be encouraged to approve and invite known friends only on social networking sites and to deny access to others by making profiles private.
• All members of the school community are advised not to publish specific and detailed private thoughts, especially those that may be considered threatening, hurtful or defamatory.
• Newsgroups will be blocked unless a specific use is approved.
• Concerns regarding students’ use of social networking, social media and personal publishing sites (in or out of school) will be raised with their parents/carers, particularly when concerning students’ underage use of sites.
• Staff personal use of social networking, social media and personal publishing sites will be discussed as part of staff induction and safe and professional behaviour will be outlined in the school Acceptable Use Policy.
5.6 How will filtering be managed? It is important that schools recognise that filtering is not 100% effective. There are ways to bypass filters (such as using proxy websites, using a device not connected to the network e.g. mobile phone). Occasionally mistakes may happen and inappropriate content may be accessed. It is therefore important that children should always be supervised when using internet access and that Acceptable Use Policies are in place. In addition, Internet Safety Rules should be displayed, and both children and adults should be educated about the risks online. There should also be an Incident Log to report breaches of filtering or inappropriate content being accessed. Procedures need to be established to report such incidents to parents and DCC. Incident log will be via the CLG for staff and a Report It button linked to the school website and user account/desktop. Any material that the school believes is illegal must be reported to appropriate agencies such as IWF, Durham Police or CEOP (see e-Safety contacts and references). Websites which schools believe should be blocked centrally should be reported to the ICT Service Desk. Teachers should always evaluate any websites/search engines before using them with their students; this includes websites shown in class as well as websites accessed directly by the pupils. Often this will mean checking the websites, search results etc just before the lesson. Remember that a site considered safe one day may be changed due to the Internet being a dynamic entity. Particular attention should
16 | P a g e
also be paid to advertisements as they can change each time the web page is accessed. Seaham High School has three possible models for changing the default filtering settings:-
1. Authorised only by the head teacher by contacting the ICT Service desk with their PIN number
2. Other staff can be delegated permission to change the filtering by contacting the service desk with a PIN number
3. Access can be changed directly by authorised people within the school by connecting to a website.
In all cases it is important to establish a protocol for establishing the responsibity for checking a site which needs changes to the filtering.
• If a contentious website is requested (e.g. youtube) it will be discussed by the e-safety committee.
• For other sites the responsibility for checking the suitability of the site rests with the teacher requesting access.
• The school’s broadband access will include filtering.
• The school will have system in place to make changes to the filter, including deciding who is responsible for authorising changes.
• The school will work with DCC to review filtering
• The school will have a clear procedure for reporting breaches of filtering. All members of the school community (all staff and all pupils) will be aware of this procedure.
• If staff or pupils discover unsuitable sites, the URL will be reported to the School e-Safety Coordinator who will then record the incident and escalate the concern as appropriate.
• The School filtering system will block all sites on the Internet Watch Foundation (IWF) list.
• Changes to the school filtering policy will be risk assessed by staff with educational and technical experience prior to any changes and where appropriate with consent from the Senior Leadership Team.
• The School Senior Leadership Team will ensure that regular checks are made to ensure that the filtering methods selected are effective.
• Any material that the school believes is illegal will be reported to appropriate agencies such as IWF, Durham Police or CEOP
5.7 How will videoconferencing be managed?
• All videoconferencing equipment in the classroom must be switched off when not in use and not set to auto answer.
• Videoconferencing contact information will not be put on the school Website.
• The equipment must be secure and if necessary locked away when not in use.
• School videoconferencing equipment will not be taken off school premises without permission.
• Responsibility for the use of the videoconferencing equipment outside school time will be established with care.
5.8 Users
17 | P a g e
• Pupils will ask permission from a teacher before making or answering a videoconference call.
• Videoconferencing will be supervised appropriately for the pupils’ age and ability.
• Parents and carers consent should be obtained prior to children taking part in videoconferences.
• Only key administrators should be given access to videoconferencing administration areas or remote control pages.
• Unique log on and password details for the educational videoconferencing services should only be issued to members of staff and kept secure.
5.9 Content
• When recording a videoconference lesson, written permission should be given by all sites and participants. The reason for the recording must be given and the recording of videoconference should be clear to all parties at the start of the conference. Recorded material shall be stored securely.
• Videoconferencing is a challenging activity with a wide range of learning benefits. Preparation and evaluation are essential to the whole activity.
• If third party materials are to be included, check that recording is acceptable to avoid infringing the third party intellectual property rights.
• Establish dialogue with other conference participants before taking part in a videoconference. If it is a non school site it is important to check that they are delivering material that is appropriate for your class.
5.10 How are emerging technologies managed?
• Emerging technologies will be examined for educational benefit and a risk assessment will be carried out before use in school is allowed.
• Pupils will be instructed about safe and appropriate use of personal devices both on and off site in accordance with the school Acceptable Use or Mobile Phone Policy.
5.11 How should personal data be protected? The Data Protection Act 1998 (“the Act”) gives individuals the right to know what information is held about them and provides a framework to ensure that personal information is handled properly. It promotes openness in the use of personal information. Under the Act every organisation that processes personal information (personal data) must notify the Information Commissioner's Office, unless they are exempt. The Data Protection Act 1998 applies to anyone who handles or has access to information concerning individuals. Everyone in the workplace has a legal duty to protect the privacy of information relating to individuals. The Act sets standards (eight data protection principles), which must be satisfied when processing personal data (information that will identify a living individual). The Act also gives rights to the people the information is about i.e. subject access rights let individuals find out what information is held about them. The eight principles are that personal data must be:
� Processed fairly and lawfully � Processed for specified purposes
18 | P a g e
� Adequate, relevant and not excessive � Accurate and up-to-date � Held no longer than is necessary � Processed in line with individual’s rights � Kept secure � Transferred only to other countries with suitable security measures.
Schools will already have information about their obligations under the Act, and this section is a reminder that all data from which people can be identified is protected. Information Commissioner’s Office: http://www.ico.gov.uk/
• Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998.
6.0 Policy Decisions 6.1 How will Internet access be authorised?
• All staff will read and sign the School Acceptable Use Policy before using any school ICT resources.
• Parents will be asked to read the School Acceptable Use Policy for pupil access and discuss it with their child, where appropriate.
• All visitor to the school site who require access to the schools network or internet access will be asked to read and sign an Acceptable Use Policy.
• Parents will be informed that pupils will be provided with supervised Internet access appropriate to their age and ability.
• When considering access for vulnerable members of the school community (such as with children with special education needs) the school will make decisions based on the specific needs and understanding of the pupil(s).
• School Wifi will have MAC address filtering through DHCP to control access. 6.2 How will risks be assessed?
• The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the global and connected nature of Internet content, it is not possible to guarantee that access to unsuitable material will never occur via a school computer. Neither the school nor DCC can accept liability for the material accessed, or any consequences resulting from Internet use.
• The school will audit ICT use to establish if the e–Safety policy is adequate and that the implementation of the e–Safety policy is appropriate.
• The use of computer systems without permission or for inappropriate purposes could constitute a criminal offence under the Computer Misuse Act 1990 and breaches will be reported to Kent Police.
• Methods to identify, assess and minimise risks will be reviewed regularly.
19 | P a g e
6.3 How will the school respond to any incidents of concern? ● All members of the school community will be informed about the procedure for
reporting e-Safety concerns (such as breaches of filtering, cyberbullying, illegal content etc).
● The e-Safety Coordinator will record all reported incidents and actions taken in the School e-Safety incident log and other in any relevant areas e.g. Bullying or Child protection log.
● The Designated Child Protection Coordinator will be informed of any e-Safety incidents involving Child Protection concerns, which will then be escalated appropriately.
● The school will manage e-Safety incidents in accordance with the school discipline/ behaviour policy where appropriate.
● The school will inform parents/carers of any incidents of concerns as and when required.
● After any investigations are completed, the school will debrief, indentify lessons learnt and implement any changes required.
● Where there is cause for concern or fear that illegal activity has taken place or is taking place then the school will contact the Children’s Safeguard Team or e-Safety officer and escalate the concern to the Police
● If the school is unsure how to proceed with any incidents of concern, then the incident may be escalated to the Area Children’s Officer or the County e-Safety Officer.
● If an incident of concern needs to be passed beyond the school then the concern will be escalated to the e-Safety officer to communicate to other school in Durham
6.4 How will e–Safety complaints be handled?
• Complaints about Internet misuse will be dealt with under the School’s complaints procedure.
• Any complaint about staff misuse will be referred to the head teacher.
• All e–Safety complaints and incidents will be recorded by the school, including any actions taken.
• Pupils and parents will be informed of the complaints procedure.
• Parents and pupils will need to work in partnership with the school to resolve issues.
• All members of the school community will need to be aware of the importance of confidentiality and the need to follow the official school procedures for reporting concerns.
• Discussions will be held with the local Police Safer Schools Partnership Coordinators and/or Children’s Safeguard Team to establish procedures for handling potentially illegal issues.
• Any issues (including sanctions) will be dealt with according to the school’s disciplinary, behaviour and child protection procedures.
• All members of the school community will be reminded about safe and appropriate behaviour online and the importance of not posting any content, comments, images or videos online which cause harm, distress or offence to any other members of the school community.
20 | P a g e
6.5 How is the Internet used across the community? ● The school will liaise with local organisations to establish a common approach to e–
Safety. ● The school will be sensitive to Internet-related issues experienced by pupils out of
school, e.g. social networking sites, and offer appropriate advice. ● The school will provide appropriate levels of supervision for students who use the
internet and technology whilst on the school site. ● The school will provide an AUP for any guest who needs to access the school
computer system or internet on site. 6.6 How will Cyberbullying be managed? There are a number of statutory obligations on schools with regard to behaviour which establish clear responsibilities to respond to bullying. In particular section 89 of the Education and Inspections Act 2006:
� every school must have measures to encourage good behaviour and prevent all forms of bullying amongst pupils. These measures should be part of the school’s behaviour policy which must be communicated to all pupils, school staff and parents
� gives headteachers the ability to ensure that pupils behave when they are not on school premises or under the lawful control of school staff.
Where bullying outside school (such as online or via text) is reported to the school, it will be investigated and acted on. For more information please read “Preventing and Tackling Bullying: Advice for School Leaders, Staff and Governing Bodies” http://www.education.gov.uk/aboutdfe/advice/f0076899/preventing-and-tackling-bullying DfE and Childnet have produced resources and guidance that can be used to give practical advice and guidance on cyberbullying: http://www.digizen.org/cyberbullying
• Cyberbullying (along with all other forms of bullying) of any member of the school community will not be tolerated. Full details are set out in the school’s policy on anti-bullying and behaviour.
• There are clear procedures in place to support anyone in the school community affected by cyberbullying.
• All incidents of cyberbullying reported to the school will be recorded.
• There will be clear procedures in place to investigate incidents or allegations of Cyberbullying.
• Pupils, staff and parents/carers will be advised to keep a record of the bullying as evidence.
• The school will take steps to identify the bully, where possible and appropriate. This may include examining school system logs, identifying and interviewing possible witnesses, and contacting the service provider and the police, if necessary.
21 | P a g e
• Pupils, staff and parents/carers will be required to work with the school to support the approach to cyberbullying and the school’s e-Safety ethos.
• Sanctions for those involved in cyberbullying may include:
• The bully will be asked to remove any material deemed to be inappropriate or a service provider may be contacted to remove content if the bully refuses or is unable to delete content.
• Internet access may be suspended at school for the user for a period of time. Other sanctions for pupils and staff may also be used in accordance to the schools anti-bullying, behaviour policy or Acceptable Use Policy.
• Parent/carers of pupils will be informed.
• The Police will be contacted if a criminal offence is suspected. 6.7 How will Learning Platforms be managed?
• SLT and staff will regularly monitor the usage of the LP by pupils and staff in all areas, in particular message and communication tools and publishing facilities.
• Pupils/staff will be advised about acceptable conduct and use when using the LP.
• Only members of the current pupil, parent/carers and staff community will have access to the LP.
• All users will be mindful of copyright issues and will only upload appropriate content onto the LP.
• When staff, pupils etc leave the school their account or rights to specific school areas will be disabled or transferred to their new establishment.
• Any concerns about content on the LP may be recorded and dealt with in the following ways:
1) The user will be asked to remove any material deemed to be inappropriate or offensive.
2) The material will be removed by the site administrator if the user does not comply.
3) Access to the LP for the user may be suspended. 4) The user will need to discuss the issues with a member of SLT before
reinstatement. 5) A pupil’s parent/carer may be informed.
• A visitor may be invited onto the LP by a member of the SLT. In this instance there may be an agreed focus or a limited time slot.
• Pupils may require editorial approval from a member of staff. This may be given to the pupil to fulfil a specific aim and may have a limited time frame.
6.8 How will mobile phones and personal devices be managed?
• The use of mobile phones and other personal devices by students and staff in school will be decided by the school and covered in the school Acceptable Use or Mobile Phone Policies.
• The sending of abusive or inappropriate messages or content via mobile phones or personal devices is forbidden by any member of the school community and any breaches will be dealt with as part of the school discipline/behaviour policy.
• School staff may confiscate a phone or device if they believe it is being used to contravene the schools behaviour or bullying policy. The phone or device might be searched by the Senior Leadership team with the consent of the pupil or parent/carer. If there is suspicion that the material on the mobile may provide
22 | P a g e
evidence relating to a criminal offence the phone will be handed over to the police for further investigation.
• Mobile phones will not be used during lessons or formal school time unless as part of an approved and directed curriculum based activity with consent from a member of staff.
• The Bluetooth function of a mobile phone should be switched off at all times and not be used to send images or files to other mobile phones.
• Electronic devices of all kinds that are brought in to school are the responsibility of the user. The school accepts no responsibility for the loss, theft or damage of such items. Nor will the school accept responsibility for any adverse health effects caused by any such devices either potential or actual.
• Mobile phones and personal devices are not permitted to be used in certain areas within the school site such as changing rooms, toilets and swimming pools.
Staff Use of Personal Devices ● If members of staff have an educational reason to allow children to use mobile
phones or personal device as part of an educational activity then it will only take place when approved by the Senior Leadership Team.
● Staff should not use personal devices such as mobile phones or cameras to take photos or videos of pupils and will only use work-provided equipment for this purpose.
● If a member of staff breaches the school policy then disciplinary action may be taken.
7.0 Communication Policy 7.1How will the policy be introduced to pupils? Consideration must be given as to the curriculum place for teaching e–Safety. This could be as an ICT lesson activity, part of the pastoral programme or part of every subject whenever pupils are using the internet. Useful e–Safety programmes include:
� Think U Know: www.thinkuknow.co.uk � Childnet: www.childnet.com � Kidsmart: www.kidsmart.org.uk � Orange Education: www.orange.co.uk/education � Safe: www.safesocialnetworking.org
• All users will be informed that network and Internet use will be monitored.
• An e–Safety training programme will be established across the school to raise the awareness and importance of safe and responsible internet use amongst pupils.
• Pupil instruction regarding responsible and safe use will precede Internet access.
• An e–Safety module will be included in the PSHE, Citizenship and/or ICT programmes covering both safe school and home use.
• e–Safety training will be part of the transition programme across the Key Stages and when moving between establishments.
• e-Safety rules or copies of the student Acceptable Use Policy will be referred to in all rooms with Internet access in a verbal format from teaching and support staff.
• Safe and responsible use of the Internet and technology will be reinforced across the curriculum and subject areas.
23 | P a g e
• Particular attention to e-Safety education will be given where pupils are considered to be vulnerable.
7.2 How will the policy be discussed with staff?
• The e–Safety Policy will be formally provided to and discussed with all members of staff.
• To protect all staff and pupils, the school will implement Acceptable Use Policies.
• Staff will be made aware that Internet traffic can be monitored and traced to the individual user. Discretion and professional conduct is essential.
• Up-to-date and appropriate staff training in safe and responsible Internet use, both professionally and personally, will be provided for all members of staff.
• Staff who manage filtering systems or monitor ICT use will be supervised by the Senior Leadership Team and have clear procedures for reporting issues.
• All members of staff will be made aware that their online conduct out of school could have an impact on their role and reputation within school. Civil, legal or disciplinary action could be taken if they are found to bring the profession or institution into disrepute, or if something is felt to have undermined confidence in their professional abilities. (See Staff Social Media Policy)
7.3 How will parents’ support be enlisted?
• Parents’ attention will be drawn to the school e–Safety Policy in newsletters, the school prospectus and on the school website.
• A partnership approach to e-Safety at home and at school with parents will be encouraged. This may include offering parent evenings with demonstrations and suggestions for safe home Internet use, or highlighting e–Safety at other attended events e.g. parent evenings and sports days.
• Parents will be requested to sign an e–Safety/Internet agreement as part of the Home School Agreement.
• Parents will be encouraged to read the school Acceptable Use Policy for pupils and discuss it’s implications with their children.
• Information and guidance for parents on e–Safety will be made available to parents I a variety of formats.
• Advice on useful resources and websites, filtering systems and educational and leisure activities which include responsible use of the Internet will be made available to parents.
• Interested parents will be referred to organisations listed in the “e–Safety Contacts and References section”.
e-Safety Contacts and References CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk Childline: www.childline.org.uk Childnet: www.childnet.com
24 | P a g e
Click Clever Click Safe Campaign: http://clickcleverclicksafe.direct.gov.uk Cybermentors: www.cybermentors.org.uk Digizen: www.digizen.org.uk Durham EDS – E-safety, Teaching and learning advice Tel: 0191 3834370 Durham Safeguarding Children Board (DLSCB): www.durham-lscb.gov.uk ICT Service Desk – Changes to filtering Tel: 03000 261100 ICTSS Service Desk – All other ICT issues Tel: 01388 424999 Internet Watch Foundation (IWF): www.iwf.org.uk Kent e–Safety in Schools Guidance: www.kenttrustweb.org.uk?esafety Kidsmart: www.kidsmart.org.uk Schools e–Safety Blog: www.kenttrustweb.org.uk?esafetyblog Teach Today: http://en.teachtoday.eu Think U Know website: www.thinkuknow.co.uk Virtual Global Taskforce — Report Abuse: www.virtualglobaltaskforce.com