SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school...

24
1 | Page SEAHAM HIGH SCHOOL E Safety Policy Adopted By: Policy Committee on behalf of Governing Body Signed: Chair of Governors – Mr D Wilkinson On: 22 nd October 2014 Review By: October 2016

Transcript of SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school...

Page 1: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

1 | P a g e

SEAHAM HIGH SCHOOL

E Safety Policy

Adopted By: Policy Committee on behalf of

Governing Body

Signed:

Chair of Governors – Mr D Wilkinson

On: 22nd October 2014

Review By: October 2016

Page 2: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

2 | P a g e

E-safety policy

Internet technology helps pupils learn creatively and effectively. It encourages

collaborative learning and the sharing of good practice amongst all school stakeholders.

The e-safety policy encourages appropriate and safe conduct and behaviour during this

process.

Pupils, staff and all other users of school-related technologies will work together to

agree standards and expectations relating to usage in order to promote and ensure

good behaviour.

These agreements and their implementation will promote positive behaviour at school.

This can transfer directly into each pupil’s adult life and prepare them for experiences

and expectations in the workplace. The policy is not designed to be a blacklist of

prohibited activities; it is a list of areas to discuss, teach and inform. It will develop

positive behaviour and knowledge leading to safer internet use and year-on-year

improvement, with a measurable impact on e-safety. The positive effects of the policy

are intended to be seen online and offline in school and at home, and ultimately beyond

school and into the workplace.

Introduction

1.1 Ofsted statements:

Ofsted have defined e-safety thus:

• ‘In the context of an inspection, e-safety may be described as the school’s ability to protect and educate pupils and staff in their use of technology and to have the appropriate mechanisms to intervene and support any incident where appropriate.’

E-safety will be inspected in relation to the following areas:

• “The behaviour and safety of pupils at the school.

• The quality of leadership in, and management of, the school”

Ofsted have identified three areas of e-safety risk in relation to pupils:

• “Being exposed to illegal, inappropriate or harmful material.

• Being subjected to harmful online interaction with other users.

• Personal online behaviour that increases the likelihood of, or causes, harm.”

An outstanding school will demonstrate that:

• “All groups of pupils feel safe at school and at alternative provision placements at all times. They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe, including in relation to e-safety.”

Ofsted will examine how the school:

• Audits the training needs of all staff and provides training to improve their knowledge of and expertise in the safe and appropriate use of new technologies.

Page 3: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

3 | P a g e

• Works closely with all families to help them ensure that their children use new technologies safely and responsibly both at home and at school.

• Uses pupils’ and families’ views more often to develop e-safety strategies.

• Manages the transition from locked down systems to more managed systems to help pupils understand how to manage risk; to provide them with richer learning experiences; and to bridge the gap between systems at school and the more open systems outside school.

• Provides an age-related, comprehensive curriculum for e-safety that enables pupils to become safe and responsible users of new technologies.

• Works with partners and other providers to ensure that pupils who receive part of their education away from school are e-safe.

• Systematically reviews and develops e-safety procedures, including training, to ensure that they have a positive impact on pupils’ knowledge and understanding.

• Ensure pupils are aware of e-safety reporting procedures in school.

Key features of good and outstanding practice:

• All staff understand e-safety issues. e-safety is a school priority. The school has, or is working towards an e-safety Mark. Training in e-safety is audited and provided to all staff. A number of members of staff have received accredited e-safety training. Pupils, parents, wider school community stakeholders and governors all contribute to build a fluid and constantly evolving e-safety policy.

• Clear and transparent procedures exist for monitoring, logging, reporting incidents, evaluating, improving and measuring the impact of e-safety. All staff, parents, pupils, contractors and governors know how to report an e-safety incident.

• The school uses recognised and accredited providers for internet provision and filtering.

• The e-safety policy is closely integrated with relevant policies and procedures, including child protection, safeguarding, acceptable use, anti-bullying and behaviour.

• The acceptable use policy agreements have been developed with, signed by, and agreed to by all users of school IT systems – pupils, parents, staff, governors, visitors and external contractors.

• The school promotes a real world, responsible and positive outlook towards Digital Literacy and e-safety aimed at preparing pupils for expected standards of behaviour in adult life and the workplace.

• The school relies on government, DfE, National College for Teaching & Leadership, (formerly TA and also GTC) and ICO guidance and documentation with regard to Data Protection, data storage and privacy compliance.

E-safety policy scope

The school e-safety policy and agreements apply to all pupils, staff, support staff,

external contractors and members of the wider school community who use, have access

to, or maintain school and school-related internet and computer systems internally and

externally.

The school will make reasonable use of relevant legislation and guidelines to effect

positive behaviour regarding ICT and internet use on and off the school site. This will

include imposing rewards and sanctions for behaviour and penalties for inappropriate

behaviour as defined as ‘regulation of student behaviour’ under the Education and

Inspections Act 2006. ‘In loco parentis’ provision under the Children Act 1989 allows the

school to report and act on instances of cyber-bullying, abuse, harassment, malicious

communication and grossly offensive material. This includes reporting to the police,

social media websites, and hosting providers on behalf of pupils.

Page 4: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

4 | P a g e

The e-safety policy covers the use of

• Mobile phones when used on the school site

• Pupils’ and staff’s personal ICT equipment when used in school and which makes

use of school networking, file-serving or internet facilities

• External access to internal school networking such as webmail, network access,

file-serving (document folders) and printing

• School-related external internet including, but not limited to, extranet, e-learning

platforms, blogs, social media websites

• School-based intranet and networking

• School-based ICT systems and equipment

• Any device that connects to the school internet or network.

• Use of remote desktop and school equipment from outside of Seaham High

School

2.0 Reviewing your e-safety policy

Reviewing and evaluating e-safety and ensuring good practice – introduction

E-safety policy results from a continuous cycle of evaluation and review based on new

initiatives and partnership discussion with stakeholders and outside organisations,

technological and internet developments, current Government guidance and school-

related e-safety incidents. The policy development cycle develops good practice within

the teaching curriculum and wider pastoral curriculum. Regular assessment of strengths

and weaknesses helps to determine inset provision for staff and governors and

guidance for parents, pupils and local partnerships.

The e-safety committee will actively monitor and evaluate the e-safety policy. This

committee will comprise:

• Child protection officer Mrs L Whitehead

• Pupils, e.g. a member of the student council refer to document

• Community stakeholders, e.g. nurseries, youth groups, sports clubs, faith

groups/representatives refer to document

• Parents and guardians, e.g. PTA, parent governors, looked-after children/social

care representatives refer to document

• Governor(s) refer to document

• External IT contractors, e.g. web developer, e-learning provider Durham ITSS

• ICT technical support and network manager Mr D Hebdon

• In the event of an e-safety incident, the following people will be informed within

school and in external agencies and stakeholder organisations. Mrs L Whitehead

& Mr D Langlands

• Teaching staff refer to document

• Head teacher and school leadership team Mr David Shield & SLT

• E-safety co-ordinator/officer Mr David Langlands

Page 5: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

5 | P a g e

In the event of an e-safety incident, the following people will be informed within school

and in external agencies and stakeholder organisations. Mrs L Whitehead & Mr D

Langlands

When will your e-safety policy and acceptable use policies be reviewed?

• At or prior to the start of each academic year

Additionally, the policy will be reviewed promptly upon:

• Advice from the police

• E-safety incidents in the community or local schools which might impact on the

school community

• Significant changes in technology as used by the school or pupils in the wider

community

• New guidance by Government/LEA/safeguarding authorities

• Serious and/or frequent breaches of the acceptable internet use policy or other in

the light of e-safety incidents

Where will the e-safety policy review be documented?

• School CLG

• In the school development plan

• School self evaluation and improvement profiling

This provision will be evidenced in the following school document(s): School CLG

'Staffroom - Policies'

The school will draw up an e-safety calendar detailing training, meetings, reviews,

evaluations, teaching and learning provision, parental involvement, wider community

involvement and governor involvement over an academic year.

• This provision will be evidenced in the following school document(s):

webcals://cid-fa70d8e3998a3e89.calendar.live.com/calendar/private/ac2139b4-

52f2-4327-8c4d-6a94c8bc88cb/d477bbd8-ab63-4a98-9532-

c017195baed6/calendar.ics

Staff, parent and pupil e-safety audits and pupil questionnaires will inform e-safety

learning and staff training requirements. This will gauge the impact and effectiveness of

the e-safety provision and determine future e-safety targets.

• This provision will be evidenced in the following school document(s): N:/eSafety

2.1 Policy review schedule

• This policy was approved by The Policy Committee - Governing Body on October

2014. It is stored here: Staffroom Policies - CLG and is published for viewing by

parents and the wider school community here: www.seahamschool.com.

• The e-safety policy will be monitored annually. The next review date is: 1st

September 2015.

Page 6: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

6 | P a g e

• The e-safety policy will be reviewed and evaluated promptly in the light of serious

e-safety incidents. The last recorded serious e-safety incident was on N/A. As a

result this policy was reviewed on N/A.

• The e-safety policy will be reviewed and evaluated promptly in the light of

important changes to legislation or Government guidance related to e-safety. The

last recorded such change was on N/A and as a result this policy was reviewed

on N/A.

The e-safety committee and e-safety co-ordinator/officer will include evidence of

evaluations of the impact of the e-safety policy in reports. Such evidence includes (tick

the boxes you wish to include):

• ParentView and/or Ofsted questionnaire results

• E-safety audits of staff, support staff, parents, governors and other stakeholders

• AfL teaching questionnaires

• Logs of internet and network traffic activity

• Statistics of filtering breaches

• Contemporaneous written reports

The governing body/proprietor will receive a report on the progress, evaluation, impact

and effectiveness of the e-safety policy annually & when a serious esafety issue arises.

This report will include suitably redacted e-safety incident accounts and statistics,

detailing how they have been resolved, and the counter measures that were

implemented.

3.0 Who does e-safety affect? Who is responsible for e-safety

and what are their roles?

3.1 School management and e-safety

School senior management is responsible for determining, evaluating and reviewing e-

safety policies. This encompasses teaching and learning, use of school IT equipment

and facilities by pupils, staff and visitors. It also includes agreed criteria for acceptable

use by pupils, school staff and governors of internet-capable equipment for school-

related purposes or in situations which will impact on the reputation of the school, and/or

on school premises.

E-safety provision is always designed to encourage positive behaviours and practical

real-world strategies for all members of the school and wider school community.

Management is encouraged to be aspirational and innovative in developing strategies

for e-safety provision which will deliver measurable success via a calendar of e-safety

provision. Management should clearly state e-safety targets with success criteria on the

school development plan.

Evidence base:

Page 7: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

7 | P a g e

• Staff inset provision audit and record (School Network) N:/eSafety

• Regularly updated e-safety policy, child protection policy and logged and

evaluated e-safety incidents (School Network) N:/eSafety

• Minutes from e-safety-related meetings with staff, SLT, parents association,

governors and wider school community stakeholders (School Network)

N:/eSafety

• E-safety calendar webcals://cid-

fa70d8e3998a3e89.calendar.live.com/calendar/private/ac2139b4-52f2-4327-

8c4d-6a94c8bc88cb/d477bbd8-ab63-4a98-9532-c017195baed6/calendar.icsa

• School development plan (School Network) N:/eSafety

3.2 The school e-safety officer or co-ordinator

The school’s designated e-safety officer Mr D Langlands reports to the SLT and

governors and co-ordinates e-safety provision across the school and wider school

community. The committee liaises with SLT, the school’s designated child protection

officer and other senior managers as required.

The school e-safety officer has a specific job description and person specification

detailing the role, remit, qualifications and qualities required for the post. This

specification is updated according to the school cycle for reviewing job descriptions.

The school’s e-safety co-ordinator chairs the school e-safety committee which includes

representatives of the school SLT, teaching and support staff, governors, parents, pupils

and the wider school community including relevant local stakeholders. Currently the e-

safety committee comprises: ICT Department

The school e-safety committee meets regularly at intervals defined in the school’s e-

safety calendar. (School Network) N:/eSafety

3.3 E-safety co-ordinator job description

• The e-safety co-ordinator is responsible for promoting best practice in e-safety

within the wider school community, including providing and being a source of

information for parents and partner stakeholders.

• Although all staff are responsible for upholding the school e-safety policy and

implementing safer internet practice, are responsible for monitoring internet use

by pupils and staff onsite, and on school machines such as laptops used off-site.

• The school e-safety co-ordinator audits and assesses inset requirements for staff,

support staff and governor e-safety training, ensuring that all staff are aware of

their responsibilities and the school’s e-safety procedures. The co-ordinator is the

first port of call for staff requiring advice on e-safety matters. (School Network)

N:/eSafety

• The school e-safety co-ordinator maintains a log of submitted e-safety reports

and incidents. (School Network) N:/eSafety

• The school e-safety co-ordinator is responsible for e-safety issues on a day-to-

day basis and liaises with LA contacts, filtering and website providers, and school

ICT support.

Page 8: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

8 | P a g e

The school’s e-safety co-ordinator chairs the school e-safety committee which includes

representatives of the school SLT, teaching and support staff, governors, parents, pupils

and the wider school community including relevant local stakeholders. The co-ordinator:

• Is responsible for monitoring, reporting and evaluating incidences of inappropriate

internet use.

• Is the first point of contact in an e-safety incident and is responsible for monitoring

and reviewing e-safety incident logs.

• Is responsible for acting as a point of contact for support and advice on e-safety

issues.

• Is responsible for promoting e-safety awareness for parents and wider

stakeholders.

• Is responsible for ensuring e-safety is embedded in the curriculum, e.g. in

schemes of work, assemblies and themed weeks.

• Is responsible for ensuring staff receive information about current trends.

• Is responsible for managing e-safety training for all staff. (School Network)

N:/eSafety

• Is responsible for ensuring acceptable use policies/school internet rules are in

place, agreed by staff, pupils and parents and are monitored, evaluated and

reviewed.

• Is responsible for ensuring the e-safety policy is adhered to.

• Is responsible for ensuring that the e-safety policy links with other appropriate

school policies, e.g. anti-bullying, child protection, ICT, PSHE.

• Is responsible for evaluating and reviewing the school’s e-safety policy, updating

at least annually.

• Is responsible for promoting a school and community-wide e-safety culture and

promoting the school’s e-safety vision to all stakeholders.

• Is responsible for completing regular e-safety audits and maintaining the e-safety

calendar in conjunction with the senior leadership team and/or head.

3.4 Governors’ responsibility for e-safety - ICT support staff and external

contractors

The governing body has joint responsibility for e-safety. The safety committee will

compromise of ICT network manager, Mr D Langlands and the Governing Body

including the Head Teacher. The school e-safety officer/co-ordinator will liaise directly

with the governing body about reports on e-safety effectiveness, incidents, monitoring,

evaluation and developing and maintaining links with local stakeholders and the wider

school community.

Page 9: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

9 | P a g e

3.5 Teaching and teaching support staff

Teaching and teaching support staff ensure that they are aware of the current school e-

safety policy, practices and associated procedures for reporting e-safety incidents.

Teaching and teaching support staff will be provided with an e-safety induction as part of

the overall staff induction procedures.

All staff must ensure that they have read, understood and signed (thereby indicating an

agreement) the acceptable use policies relevant to internet and computer use in school.

All staff must follow the school’s social media policy regarding external off-site use,

personal use (being mindful of bringing the school into disrepute), possible contractual

obligations, and conduct on internet school messaging or communication platforms, e.g.

email, VLE messages and forums and the school website.

All teaching staff must rigorously monitor pupil internet and computer use in line with the

policy. This includes the use of personal technology such as cameras, phones and other

gadgets on the school site.

Teaching staff should promote best practice regarding avoiding copyright infringement

and plagiarism.

Internet use and suggested websites should be pre-vetted and documented in lesson

planning.

3.6 Child protection officer

The Child Protection Officer is able to differentiate which e-safety incidents are required

to be reported to CEOP, local police, LADO, social services and parents/guardians. The

individual will also determine whether the information from such an incident should be

restricted to nominated members of the leadership team.

The child protection officer knows how to deal appropriately with incidents including (but

not limited to):

• Allegations against members of staff

• Computer crime, e.g. hacking of school systems

• Allegations or evidence of ‘grooming’

• Allegations or evidence of cyber bullying in the form of threats of violence,

harassment or a malicious communication.

The Child Protection Officer is responsible for acting ‘in loco parentis’ and liaising with

websites and social media platforms such as Twitter and Facebook to remove instances

of illegal material or cyber-bullying

3.7 Pupils

Pupils are required to use school internet and computer systems in agreement with the

terms specified in the school’s acceptable use policies. Pupils are expected to sign the

policy to indicate agreement, and/or have their parents/guardians sign on their behalf.

Page 10: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

10 | P a g e

Pupils are aware of how to report e-safety incidents in school, and how to use external

reporting facilities, such as the CEOP report abuse button.

Pupils are aware that school acceptable use policies cover all computer, internet and

gadget usage in school, including the use of personal items such as phones.

Pupils are aware that their internet use out of school on social networking sites such as

Facebook is covered under the acceptable use policy if it impacts on the school and/or

its staff and pupils in terms of cyber-bullying, reputation or illegal activities.

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

3.8 Parents and guardians

It is hoped that parents and guardians will support the school’s stance on promoting

good internet behaviour and responsible use of IT equipment both at school and at

home.

The school expects parents and guardians to sign the school’s acceptable use polices,

indicating agreement regarding their child’s use and also their own use with regard to

parental access to school systems such as extranets, websites, forums, social media,

online reporting arrangements, questionnaires and the VLE.

Parents

The school will provide opportunities to educate parents with regard to e-safety,

including:

• Parents’ evenings, open days, transition evenings, or other events to take

advantage of occasions when there are large numbers of parents in school.

• E-safety information delivered to parents directly, including: letters, newsletters,

parentmail, website-subscribed news emails, the school extranet, learning

platform, website or VLE.

3.9 Guidance for other users

Other users such as school visitors, wider school community stakeholders or external

contractors are expected to agree to a visitor’s AUP document or a tailored AUP

document specific to their level of access and usage.

External users with significant access to school systems including sensitive information

or information held securely under the Data Protection Act should be DRB-checked.

This includes external contractors who might maintain the school domain name and web

hosting, which would facilitate access to cloud file storage, website documents and

email.

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

Page 11: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

11 | P a g e

3.10 Wider school community and stakeholders

Possible information dissemination opportunities:

• Twilight courses or a series of presentations run by the school for parents and

wider school community stakeholders.

• Open days or other events to take advantage of occasions when there are large

numbers of visitors in school.

• E-safety information delivered to stakeholder directly, including: letters;

newsletters; website-subscribed news emails; school extranet; learning platform;

website; or VLE.

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

3.11 Staff – inset and training

E-safety information directly delivered to staff including: letters; newsletters; website-

subscribed news emails; school extranet; learning platform; website; or VLE.

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

A planned calendar programme of e-safety training opportunities to be made available

for staff including: on-site inset; whole staff training; online training opportunities (for

example NAACE courses); external CPD courses; accredited CPD courses (for example

cyber-mentors or CEOP); and co-ordinator training.

This provision will be evidenced in the following school documents: CPD Calendar

The e-safety policy will be updated and evaluated by staff at the beginning of each

academic year and timetabled into the INSET day schedule.

The e-safety co-ordinator/officer should be the first port of call for staff requiring e-safety

advice.

3.12 Governors – training

Possible training and information dissemination opportunities:

• Governors should also be given access to staff inset training and to specific

governor training provided externally (for example by the LEA, NAACE online or

the National Governors Association).

• Twilight courses or a series of presentations run by the school for parents and

wider school community stakeholders.

• Open days or other events to take advantage of occasions when there are large

numbers of visitors in school.

• E-safety information delivered to governors directly including: letters; newsletters;

website-subscribed news emails; school extranet; learning platform; website; or

VLE.

Page 12: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

12 | P a g e

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

3.13 ICT support staff - contractors, filtering and monitoring

Possible training and information dissemination opportunities:

• IT technical support staff and network managers should have relevant industry

experience and Microsoft/Cisco-certified qualifications.

• Support staff and contractors need to be DRB-checked and agree to and sign the

school’s e-safety AUP.

• IT support staff and contractors should ensure that bought-in hardware and

software solutions feature built-in training provision.

• Support staff and contractors should also be given access to staff inset training

and specific governor training provided externally (for example by the LEA or

NAACE online).

• Twilight courses or a series of presentations run by the school for parents and

wider school community stakeholders.

• Open days or other events to take advantage of occasions when there are large

numbers of visitors in school.

• E-safety information delivered to support staff directly, including: letters;

newsletters; website-subscribed news emails; school extranet; learning platform;

website; or VLE.

This provision will be evidenced in the following school documents: (School Network)

N:/eSafety

4.0 Teaching and learning Why is Internet use important? 4.1 Seaham High School understands that:

• Internet use is part of the statutory curriculum and is a necessary tool for learning.

• The Internet is a part of everyday life for education, business and social interaction.

• The school has a duty to provide students with quality Internet access as part of their learning experience.

• Pupils use the Internet widely outside school and need to learn how to evaluate Internet information and to take care of their own safety and security.

• The purpose of Internet use in school is to raise educational standards, to promote pupil achievement, to support the professional work of staff and to enhance the school’s management functions.

• Internet access is an entitlement for students who show a responsible and mature approach to its use.

Page 13: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

13 | P a g e

4.2 How does Internet use benefit education? Benefits of using the Internet in education include: ● access to worldwide educational resources including museums and art galleries; ● educational and cultural exchanges between pupils worldwide; ● vocational, social and leisure use in libraries, clubs and at home; ● access to experts in many fields for pupils and staff; ● professional development for staff through access to national developments,

educational materials and effective curriculum practice; ● collaboration across networks of schools, support services and professional

associations; ● improved access to technical support including remote management of networks and

automatic system updates; ● exchange of curriculum and administration data with DCC and DfE; ● access to learning wherever and whenever convenient. 4.3 How can Internet use enhance learning?

• The school’s Internet access will be designed to enhance and extend education.

• Pupils will be taught what Internet use is acceptable and what is not and given clear objectives for Internet use.

• The schools will ensure that the copying and subsequent use of Internet-derived materials by staff and pupils complies with copyright law.

• Staff should guide pupils to online activities that will support the learning outcomes planned for the pupils’ age and ability.

• Pupils will be educated in the effective use of the Internet in research, including the skills of knowledge location, retrieval and evaluation.

• Pupils will be taught to acknowledge the source of information used and to respect copyright when using Internet material in their own work.

5.0 Managing Information Systems 5.1How will information systems security be maintained?

• The security of the school information systems and users will be reviewed regularly.

• Virus protection will be updated regularly.

• The school will comply with the terms of the data protection act, and is responsible for registering with the information commissioner’s office . www.ico.gov.uk advice is available from www.ico.gov.uk/for_organisations/sector_guides/education.aspx

• Personal data sent over the Internet or taken off site will be encrypted.

• Portable media may not used without specific permission followed by an anti-virus / malware scan.

• Unapproved software will not be allowed in work areas or attached to email.

• Files held on the school’s network will be regularly checked.

• The ICT coordinator/network manager will review system capacity regularly.

• The use of user logins and passwords to access the school network will be enforced.

Page 14: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

14 | P a g e

5.2 How will email be managed?

• Pupils may only use approved email accounts for school purposes. This will include the DCC CLG or Seaham High School Google Apps for Education account.

• Pupils must immediately tell a designated member of staff if they receive offensive email.

• Pupils must not reveal personal details of themselves or others in email communication, or arrange to meet anyone without specific permission from an adult.

• Staff will only use official school provided email accounts to communicate with pupils and parents/carers, as approved by the Senior Leadership Team.

• Access in school to external personal email accounts may be blocked.

• Excessive social email use can interfere with learning and will be restricted.

• Email sent to external organisations should be written carefully and authorised before sending, in the same way as a letter written on school headed paper would be.

• The forwarding of chain messages is not permitted.

• Schools will have a dedicated email for reporting wellbeing and pastoral issues. This inbox will be managed by designated and trained staff.

• Staff should not use personal email accounts during school hours or for professional purposes.

5.3 How will published content be managed?

• The contact details on the website should be the school address, email and telephone number. Staff or pupils’ personal information must not be published.

• The head teacher will take overall editorial responsibility for online content published by the school and will ensure that content published is accurate and appropriate.

• The school website will comply with the school’s guidelines for publications including respect for intellectual property rights, privacy policies and copyright.

5.4 Can pupils’ images or work be published?

• Images or videos that include pupils will be selected carefully and will not provide material that could be reused.

• Pupils’ full names will not be used anywhere on the website, particularly in association with photographs.

• Written permission from parents or carers will be obtained before images/videos of pupils are electronically published.

• Pupils work can only be published with their permission or the parents.

• Written consent will be kept by the school where pupils’ images are used for publicity purposes, until the image is no longer in use.

• The School will have a policy regarding the use of photographic images of children which outlines policies and procedures.

5.5 How will social networking, social media and personal publishing be managed?

• The school will control access to social media and social networking sites.

Page 15: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

15 | P a g e

• Pupils will be advised never to give out personal details of any kind which may identify them and/or their location. Examples would include real name, address, mobile or landline phone numbers, school attended, IM and email addresses, full names of friends/family, specific interests and clubs etc.

• Staff wishing to use Social Media tools with students as part of the curriculum will risk assess the sites before use and check the sites terms and conditions to ensure the site is age appropriate. Staff will obtain documented consent from the Senior Leadership Team before using Social Media tools in the classroom.

• Staff official blogs or wikis should be password protected and run from the school website with approval from the Senior Leadership Team. Members of staff are advised not to run social network spaces for pupil use on a personal basis.

• Personal publishing will be taught via age appropriate sites that are suitable for educational purposes. They will be moderated by the school where possible.

• Pupils will be advised on security and privacy online and will be encouraged to set passwords, deny access to unknown individuals and to block unwanted communications. Pupil will be encouraged to approve and invite known friends only on social networking sites and to deny access to others by making profiles private.

• All members of the school community are advised not to publish specific and detailed private thoughts, especially those that may be considered threatening, hurtful or defamatory.

• Newsgroups will be blocked unless a specific use is approved.

• Concerns regarding students’ use of social networking, social media and personal publishing sites (in or out of school) will be raised with their parents/carers, particularly when concerning students’ underage use of sites.

• Staff personal use of social networking, social media and personal publishing sites will be discussed as part of staff induction and safe and professional behaviour will be outlined in the school Acceptable Use Policy.

5.6 How will filtering be managed? It is important that schools recognise that filtering is not 100% effective. There are ways to bypass filters (such as using proxy websites, using a device not connected to the network e.g. mobile phone). Occasionally mistakes may happen and inappropriate content may be accessed. It is therefore important that children should always be supervised when using internet access and that Acceptable Use Policies are in place. In addition, Internet Safety Rules should be displayed, and both children and adults should be educated about the risks online. There should also be an Incident Log to report breaches of filtering or inappropriate content being accessed. Procedures need to be established to report such incidents to parents and DCC. Incident log will be via the CLG for staff and a Report It button linked to the school website and user account/desktop. Any material that the school believes is illegal must be reported to appropriate agencies such as IWF, Durham Police or CEOP (see e-Safety contacts and references). Websites which schools believe should be blocked centrally should be reported to the ICT Service Desk. Teachers should always evaluate any websites/search engines before using them with their students; this includes websites shown in class as well as websites accessed directly by the pupils. Often this will mean checking the websites, search results etc just before the lesson. Remember that a site considered safe one day may be changed due to the Internet being a dynamic entity. Particular attention should

Page 16: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

16 | P a g e

also be paid to advertisements as they can change each time the web page is accessed. Seaham High School has three possible models for changing the default filtering settings:-

1. Authorised only by the head teacher by contacting the ICT Service desk with their PIN number

2. Other staff can be delegated permission to change the filtering by contacting the service desk with a PIN number

3. Access can be changed directly by authorised people within the school by connecting to a website.

In all cases it is important to establish a protocol for establishing the responsibity for checking a site which needs changes to the filtering.

• If a contentious website is requested (e.g. youtube) it will be discussed by the e-safety committee.

• For other sites the responsibility for checking the suitability of the site rests with the teacher requesting access.

• The school’s broadband access will include filtering.

• The school will have system in place to make changes to the filter, including deciding who is responsible for authorising changes.

• The school will work with DCC to review filtering

• The school will have a clear procedure for reporting breaches of filtering. All members of the school community (all staff and all pupils) will be aware of this procedure.

• If staff or pupils discover unsuitable sites, the URL will be reported to the School e-Safety Coordinator who will then record the incident and escalate the concern as appropriate.

• The School filtering system will block all sites on the Internet Watch Foundation (IWF) list.

• Changes to the school filtering policy will be risk assessed by staff with educational and technical experience prior to any changes and where appropriate with consent from the Senior Leadership Team.

• The School Senior Leadership Team will ensure that regular checks are made to ensure that the filtering methods selected are effective.

• Any material that the school believes is illegal will be reported to appropriate agencies such as IWF, Durham Police or CEOP

5.7 How will videoconferencing be managed?

• All videoconferencing equipment in the classroom must be switched off when not in use and not set to auto answer.

• Videoconferencing contact information will not be put on the school Website.

• The equipment must be secure and if necessary locked away when not in use.

• School videoconferencing equipment will not be taken off school premises without permission.

• Responsibility for the use of the videoconferencing equipment outside school time will be established with care.

5.8 Users

Page 17: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

17 | P a g e

• Pupils will ask permission from a teacher before making or answering a videoconference call.

• Videoconferencing will be supervised appropriately for the pupils’ age and ability.

• Parents and carers consent should be obtained prior to children taking part in videoconferences.

• Only key administrators should be given access to videoconferencing administration areas or remote control pages.

• Unique log on and password details for the educational videoconferencing services should only be issued to members of staff and kept secure.

5.9 Content

• When recording a videoconference lesson, written permission should be given by all sites and participants. The reason for the recording must be given and the recording of videoconference should be clear to all parties at the start of the conference. Recorded material shall be stored securely.

• Videoconferencing is a challenging activity with a wide range of learning benefits. Preparation and evaluation are essential to the whole activity.

• If third party materials are to be included, check that recording is acceptable to avoid infringing the third party intellectual property rights.

• Establish dialogue with other conference participants before taking part in a videoconference. If it is a non school site it is important to check that they are delivering material that is appropriate for your class.

5.10 How are emerging technologies managed?

• Emerging technologies will be examined for educational benefit and a risk assessment will be carried out before use in school is allowed.

• Pupils will be instructed about safe and appropriate use of personal devices both on and off site in accordance with the school Acceptable Use or Mobile Phone Policy.

5.11 How should personal data be protected? The Data Protection Act 1998 (“the Act”) gives individuals the right to know what information is held about them and provides a framework to ensure that personal information is handled properly. It promotes openness in the use of personal information. Under the Act every organisation that processes personal information (personal data) must notify the Information Commissioner's Office, unless they are exempt. The Data Protection Act 1998 applies to anyone who handles or has access to information concerning individuals. Everyone in the workplace has a legal duty to protect the privacy of information relating to individuals. The Act sets standards (eight data protection principles), which must be satisfied when processing personal data (information that will identify a living individual). The Act also gives rights to the people the information is about i.e. subject access rights let individuals find out what information is held about them. The eight principles are that personal data must be:

� Processed fairly and lawfully � Processed for specified purposes

Page 18: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

18 | P a g e

� Adequate, relevant and not excessive � Accurate and up-to-date � Held no longer than is necessary � Processed in line with individual’s rights � Kept secure � Transferred only to other countries with suitable security measures.

Schools will already have information about their obligations under the Act, and this section is a reminder that all data from which people can be identified is protected. Information Commissioner’s Office: http://www.ico.gov.uk/

• Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998.

6.0 Policy Decisions 6.1 How will Internet access be authorised?

• All staff will read and sign the School Acceptable Use Policy before using any school ICT resources.

• Parents will be asked to read the School Acceptable Use Policy for pupil access and discuss it with their child, where appropriate.

• All visitor to the school site who require access to the schools network or internet access will be asked to read and sign an Acceptable Use Policy.

• Parents will be informed that pupils will be provided with supervised Internet access appropriate to their age and ability.

• When considering access for vulnerable members of the school community (such as with children with special education needs) the school will make decisions based on the specific needs and understanding of the pupil(s).

• School Wifi will have MAC address filtering through DHCP to control access. 6.2 How will risks be assessed?

• The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the global and connected nature of Internet content, it is not possible to guarantee that access to unsuitable material will never occur via a school computer. Neither the school nor DCC can accept liability for the material accessed, or any consequences resulting from Internet use.

• The school will audit ICT use to establish if the e–Safety policy is adequate and that the implementation of the e–Safety policy is appropriate.

• The use of computer systems without permission or for inappropriate purposes could constitute a criminal offence under the Computer Misuse Act 1990 and breaches will be reported to Kent Police.

• Methods to identify, assess and minimise risks will be reviewed regularly.

Page 19: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

19 | P a g e

6.3 How will the school respond to any incidents of concern? ● All members of the school community will be informed about the procedure for

reporting e-Safety concerns (such as breaches of filtering, cyberbullying, illegal content etc).

● The e-Safety Coordinator will record all reported incidents and actions taken in the School e-Safety incident log and other in any relevant areas e.g. Bullying or Child protection log.

● The Designated Child Protection Coordinator will be informed of any e-Safety incidents involving Child Protection concerns, which will then be escalated appropriately.

● The school will manage e-Safety incidents in accordance with the school discipline/ behaviour policy where appropriate.

● The school will inform parents/carers of any incidents of concerns as and when required.

● After any investigations are completed, the school will debrief, indentify lessons learnt and implement any changes required.

● Where there is cause for concern or fear that illegal activity has taken place or is taking place then the school will contact the Children’s Safeguard Team or e-Safety officer and escalate the concern to the Police

● If the school is unsure how to proceed with any incidents of concern, then the incident may be escalated to the Area Children’s Officer or the County e-Safety Officer.

● If an incident of concern needs to be passed beyond the school then the concern will be escalated to the e-Safety officer to communicate to other school in Durham

6.4 How will e–Safety complaints be handled?

• Complaints about Internet misuse will be dealt with under the School’s complaints procedure.

• Any complaint about staff misuse will be referred to the head teacher.

• All e–Safety complaints and incidents will be recorded by the school, including any actions taken.

• Pupils and parents will be informed of the complaints procedure.

• Parents and pupils will need to work in partnership with the school to resolve issues.

• All members of the school community will need to be aware of the importance of confidentiality and the need to follow the official school procedures for reporting concerns.

• Discussions will be held with the local Police Safer Schools Partnership Coordinators and/or Children’s Safeguard Team to establish procedures for handling potentially illegal issues.

• Any issues (including sanctions) will be dealt with according to the school’s disciplinary, behaviour and child protection procedures.

• All members of the school community will be reminded about safe and appropriate behaviour online and the importance of not posting any content, comments, images or videos online which cause harm, distress or offence to any other members of the school community.

Page 20: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

20 | P a g e

6.5 How is the Internet used across the community? ● The school will liaise with local organisations to establish a common approach to e–

Safety. ● The school will be sensitive to Internet-related issues experienced by pupils out of

school, e.g. social networking sites, and offer appropriate advice. ● The school will provide appropriate levels of supervision for students who use the

internet and technology whilst on the school site. ● The school will provide an AUP for any guest who needs to access the school

computer system or internet on site. 6.6 How will Cyberbullying be managed? There are a number of statutory obligations on schools with regard to behaviour which establish clear responsibilities to respond to bullying. In particular section 89 of the Education and Inspections Act 2006:

� every school must have measures to encourage good behaviour and prevent all forms of bullying amongst pupils. These measures should be part of the school’s behaviour policy which must be communicated to all pupils, school staff and parents

� gives headteachers the ability to ensure that pupils behave when they are not on school premises or under the lawful control of school staff.

Where bullying outside school (such as online or via text) is reported to the school, it will be investigated and acted on. For more information please read “Preventing and Tackling Bullying: Advice for School Leaders, Staff and Governing Bodies” http://www.education.gov.uk/aboutdfe/advice/f0076899/preventing-and-tackling-bullying DfE and Childnet have produced resources and guidance that can be used to give practical advice and guidance on cyberbullying: http://www.digizen.org/cyberbullying

• Cyberbullying (along with all other forms of bullying) of any member of the school community will not be tolerated. Full details are set out in the school’s policy on anti-bullying and behaviour.

• There are clear procedures in place to support anyone in the school community affected by cyberbullying.

• All incidents of cyberbullying reported to the school will be recorded.

• There will be clear procedures in place to investigate incidents or allegations of Cyberbullying.

• Pupils, staff and parents/carers will be advised to keep a record of the bullying as evidence.

• The school will take steps to identify the bully, where possible and appropriate. This may include examining school system logs, identifying and interviewing possible witnesses, and contacting the service provider and the police, if necessary.

Page 21: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

21 | P a g e

• Pupils, staff and parents/carers will be required to work with the school to support the approach to cyberbullying and the school’s e-Safety ethos.

• Sanctions for those involved in cyberbullying may include:

• The bully will be asked to remove any material deemed to be inappropriate or a service provider may be contacted to remove content if the bully refuses or is unable to delete content.

• Internet access may be suspended at school for the user for a period of time. Other sanctions for pupils and staff may also be used in accordance to the schools anti-bullying, behaviour policy or Acceptable Use Policy.

• Parent/carers of pupils will be informed.

• The Police will be contacted if a criminal offence is suspected. 6.7 How will Learning Platforms be managed?

• SLT and staff will regularly monitor the usage of the LP by pupils and staff in all areas, in particular message and communication tools and publishing facilities.

• Pupils/staff will be advised about acceptable conduct and use when using the LP.

• Only members of the current pupil, parent/carers and staff community will have access to the LP.

• All users will be mindful of copyright issues and will only upload appropriate content onto the LP.

• When staff, pupils etc leave the school their account or rights to specific school areas will be disabled or transferred to their new establishment.

• Any concerns about content on the LP may be recorded and dealt with in the following ways:

1) The user will be asked to remove any material deemed to be inappropriate or offensive.

2) The material will be removed by the site administrator if the user does not comply.

3) Access to the LP for the user may be suspended. 4) The user will need to discuss the issues with a member of SLT before

reinstatement. 5) A pupil’s parent/carer may be informed.

• A visitor may be invited onto the LP by a member of the SLT. In this instance there may be an agreed focus or a limited time slot.

• Pupils may require editorial approval from a member of staff. This may be given to the pupil to fulfil a specific aim and may have a limited time frame.

6.8 How will mobile phones and personal devices be managed?

• The use of mobile phones and other personal devices by students and staff in school will be decided by the school and covered in the school Acceptable Use or Mobile Phone Policies.

• The sending of abusive or inappropriate messages or content via mobile phones or personal devices is forbidden by any member of the school community and any breaches will be dealt with as part of the school discipline/behaviour policy.

• School staff may confiscate a phone or device if they believe it is being used to contravene the schools behaviour or bullying policy. The phone or device might be searched by the Senior Leadership team with the consent of the pupil or parent/carer. If there is suspicion that the material on the mobile may provide

Page 22: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

22 | P a g e

evidence relating to a criminal offence the phone will be handed over to the police for further investigation.

• Mobile phones will not be used during lessons or formal school time unless as part of an approved and directed curriculum based activity with consent from a member of staff.

• The Bluetooth function of a mobile phone should be switched off at all times and not be used to send images or files to other mobile phones.

• Electronic devices of all kinds that are brought in to school are the responsibility of the user. The school accepts no responsibility for the loss, theft or damage of such items. Nor will the school accept responsibility for any adverse health effects caused by any such devices either potential or actual.

• Mobile phones and personal devices are not permitted to be used in certain areas within the school site such as changing rooms, toilets and swimming pools.

Staff Use of Personal Devices ● If members of staff have an educational reason to allow children to use mobile

phones or personal device as part of an educational activity then it will only take place when approved by the Senior Leadership Team.

● Staff should not use personal devices such as mobile phones or cameras to take photos or videos of pupils and will only use work-provided equipment for this purpose.

● If a member of staff breaches the school policy then disciplinary action may be taken.

7.0 Communication Policy 7.1How will the policy be introduced to pupils? Consideration must be given as to the curriculum place for teaching e–Safety. This could be as an ICT lesson activity, part of the pastoral programme or part of every subject whenever pupils are using the internet. Useful e–Safety programmes include:

� Think U Know: www.thinkuknow.co.uk � Childnet: www.childnet.com � Kidsmart: www.kidsmart.org.uk � Orange Education: www.orange.co.uk/education � Safe: www.safesocialnetworking.org

• All users will be informed that network and Internet use will be monitored.

• An e–Safety training programme will be established across the school to raise the awareness and importance of safe and responsible internet use amongst pupils.

• Pupil instruction regarding responsible and safe use will precede Internet access.

• An e–Safety module will be included in the PSHE, Citizenship and/or ICT programmes covering both safe school and home use.

• e–Safety training will be part of the transition programme across the Key Stages and when moving between establishments.

• e-Safety rules or copies of the student Acceptable Use Policy will be referred to in all rooms with Internet access in a verbal format from teaching and support staff.

• Safe and responsible use of the Internet and technology will be reinforced across the curriculum and subject areas.

Page 23: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

23 | P a g e

• Particular attention to e-Safety education will be given where pupils are considered to be vulnerable.

7.2 How will the policy be discussed with staff?

• The e–Safety Policy will be formally provided to and discussed with all members of staff.

• To protect all staff and pupils, the school will implement Acceptable Use Policies.

• Staff will be made aware that Internet traffic can be monitored and traced to the individual user. Discretion and professional conduct is essential.

• Up-to-date and appropriate staff training in safe and responsible Internet use, both professionally and personally, will be provided for all members of staff.

• Staff who manage filtering systems or monitor ICT use will be supervised by the Senior Leadership Team and have clear procedures for reporting issues.

• All members of staff will be made aware that their online conduct out of school could have an impact on their role and reputation within school. Civil, legal or disciplinary action could be taken if they are found to bring the profession or institution into disrepute, or if something is felt to have undermined confidence in their professional abilities. (See Staff Social Media Policy)

7.3 How will parents’ support be enlisted?

• Parents’ attention will be drawn to the school e–Safety Policy in newsletters, the school prospectus and on the school website.

• A partnership approach to e-Safety at home and at school with parents will be encouraged. This may include offering parent evenings with demonstrations and suggestions for safe home Internet use, or highlighting e–Safety at other attended events e.g. parent evenings and sports days.

• Parents will be requested to sign an e–Safety/Internet agreement as part of the Home School Agreement.

• Parents will be encouraged to read the school Acceptable Use Policy for pupils and discuss it’s implications with their children.

• Information and guidance for parents on e–Safety will be made available to parents I a variety of formats.

• Advice on useful resources and websites, filtering systems and educational and leisure activities which include responsible use of the Internet will be made available to parents.

• Interested parents will be referred to organisations listed in the “e–Safety Contacts and References section”.

e-Safety Contacts and References CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk Childline: www.childline.org.uk Childnet: www.childnet.com

Page 24: SEAHAM HIGH SCHOOL€¦ · • This provision will be evidenced in the following school document(s): N:/eSafety 2.1 Policy review schedule • This policy was approved by The Policy

24 | P a g e

Click Clever Click Safe Campaign: http://clickcleverclicksafe.direct.gov.uk Cybermentors: www.cybermentors.org.uk Digizen: www.digizen.org.uk Durham EDS – E-safety, Teaching and learning advice Tel: 0191 3834370 Durham Safeguarding Children Board (DLSCB): www.durham-lscb.gov.uk ICT Service Desk – Changes to filtering Tel: 03000 261100 ICTSS Service Desk – All other ICT issues Tel: 01388 424999 Internet Watch Foundation (IWF): www.iwf.org.uk Kent e–Safety in Schools Guidance: www.kenttrustweb.org.uk?esafety Kidsmart: www.kidsmart.org.uk Schools e–Safety Blog: www.kenttrustweb.org.uk?esafetyblog Teach Today: http://en.teachtoday.eu Think U Know website: www.thinkuknow.co.uk Virtual Global Taskforce — Report Abuse: www.virtualglobaltaskforce.com