1 / 49

Primary ICT E-safety Workshops 31st Jan and 1st Feb 2012

cayenne
Télécharger la présentation

Primary ICT E-safety Workshops 31st Jan and 1st Feb 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Primary ICT E-safety Workshops 31st Jan and 1st Feb 2012

    2. Agenda

    3. Agenda

    4. Objectives

    5. Keeping up with the Joneses SID resources 2012

    6. E-safety Review What have you come to this e-safety workshop for? Have you, or the school, had issues with online safety

    7. Surrey E-safety Website

    8. Surrey Safeguarding Children Board E-safety documents Important for all other aspects of safeguarding www.surreycc.gov.uk

    9. Important documents for schools E-safety Toolkit Jan 2012 Draft Safe Practice with Technology now part of FAQs Learning #platform dev Learning #platform dev

    10. The Safer Internet Centre has been funded by the European Commission to provide a Helpline for professionals who work with children and young people in the UK, specifically tackling the area of e-safety. We provide support with all aspects of digital and online issues such as social networking sites, cyber-bullying, sexting, online gaming and child protection online. The Helpline aims to resolve issues professionals face about themselves, such as protecting professional identity and reputation, as well as young people in relation to online safety. Updates -safer internet website

    12. A recent study, conducted by Plymouth Council, surveyed the internet habits of 423 under-fives, with an average age of four. It found 305 used the internet every day, often unsupervised. Whilst the survey indicated that the most popular sites were CBeebies and Peppa Pig,Professor Tanya Byron, a clinical psychologist, said leaving a five-year-old unsupervised on the internet is equivalent to abandoning a kid in a shopping centre for a couple of hours. If you work in an Early Years setting and want further information then why not take a look at:- Plymouth's Early Years Toolkit. Plymouth Council Survey Mar 2011

    13. Improving e-safety in primary schools: a guidance document Useful review of where Primary schools are in relation to e-safety. September 2011 Centre for Education and Inclusion Research Sheffield Hallam University Shipton Report CEIR

    14. Ofsted Framework 2012

    15. Ofsted Framework 2012 Achievement of pupils at the school Quality of teaching in the school Behaviour and safety of pupils at the school Quality of leadership in and management of the school = Overall effectiveness If one of the 4 is inadequate then overall effectiveness is inadequate 2012 easier to understand because only 4 judgements instead of 322012 easier to understand because only 4 judgements instead of 32

    16. Criteria for Behaviour and Safety When evaluating the behaviour and safety of pupils at the school, inspectors must consider: pupils attitudes to learning and conduct in lessons and around the school pupils behaviour towards, and respect for, other young people and adults, including, for example, freedom from bullying and harassment that may include cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability how well teachers manage the behaviour and expectations of pupils to ensure that all pupils have an equal and fair chance to thrive and learn in an atmosphere of respect and dignity pupils ability to assess and manage risk appropriately and keep themselves safe how well the school ensures the systematic and consistent management of behaviour. E-safety most dominate in Behaviour and L&M Features as part of bullying Ability fo pupils to assess risks and know what to do about it L&M systems in place to cope with itE-safety most dominate in Behaviour and L&M Features as part of bullying Ability fo pupils to assess risks and know what to do about it L&M systems in place to cope with it

    17. How to evaluate the range of evidence (judgements must not be made solely on the basis of what is seen during an inspection}: Evidence for B&S may contributions to spiritual, moral, social and cultural Types, rates and patterns of bullying. including cyber-bullying The extent to which pupils are able to understand and respond to risk, for example risks associated with extremism, new technology SMSC on Efs pupil interviews Monitoring systems Observations in playgrounds etcSMSC on Efs pupil interviews Monitoring systems Observations in playgrounds etc

    18. Translates into a grade descriptor for Outstanding of Instances of bullying, including for example, cyber-bullying and prejudice-based bullying related to special educational need, sexual orientation, sex, race, religion and belief, gender reassignment or disability, are extremely rare. Pupils are acutely aware of different forms of bullying and actively try to prevent it from occurring. The school has an active and highly effective approach to identifying and tackling bullying. All groups of pupils feel safe at school at all times. They understand very clearly what constitutes unsafe situations and are highly aware of how to keep themselves and others safe. Emphasis is on pupils being educated, not shieldedEmphasis is on pupils being educated, not shielded

    19. Leadership and management Outline guidance inspectors should focus on how effective L&M overcomes barriers to learning, these are likely to include: strategies and procedures, including the provision of appropriate guidance, to help pupils prepare for life in modern democratic Britain and a global society L& M at all levels Internet worries mustnt be a barrier to learning so need to have: Procedures and systems Pupils educated about risks and using global resources L& M at all levels Internet worries mustnt be a barrier to learning so need to have: Procedures and systems Pupils educated about risks and using global resources

    20. Safer Internet Day 2012 Tuesday 7th February 2012 Connecting generations and educating each other, http://www.saferinternet.org

    21. Resources available Thinkuknow.co.uk SID day (requires registration) Safer Internet Day website Insafe website Lesson plans Banners/logo/posters/videos Keeping up with the Joneses (Thinkuknow.co.uk) Assembly PowerPoint SID radio All web links available from SID page of Surrey e-safety website What resources are available?

    22. Assembly PowerPoint

    23. What can schools do?

    24. SWGfL 360 Safe SWGfL e-safety self review tool Free to register May become costed Obtain an e-safety Mark 750 for assessment Learning #platform dev Learning #platform dev

    31. E-Safety and the Curriculum

    32. Updated Surrey E-Safety SoW Maps out e-safety progression Incorporates e-safety resources Recognises links to PSHCE/ICT

    33. Latest teaching resources

    34. SEN Resources Know Your Friends with Josh and Sue 5 minute animation for KS2 3 versions created inc. audio only. www.thinkuknow.co.uk Some groups of children are potentially more vulnerable & at risk than others when using ICT, e.g. children with Autism Spectrum Disorder may make very literal interpretations of the content they encounter, affecting their responses. Some children with complex needs may not understand concepts of friendship and therefore trust people implicitly. With this in mind, CEOP have created some SEN resources, inc a 5 min animation, Know Your Friends with Josh and Sue depicting 2 friends who are the victims of cyberbullying. 3 versions have been created for different needs. Important messages, delivered in a clear unambiguous way. Some groups of children are potentially more vulnerable & at risk than others when using ICT, e.g. children with Autism Spectrum Disorder may make very literal interpretations of the content they encounter, affecting their responses. Some children with complex needs may not understand concepts of friendship and therefore trust people implicitly. With this in mind, CEOP have created some SEN resources, inc a 5 min animation, Know Your Friends with Josh and Sue depicting 2 friends who are the victims of cyberbullying. 3 versions have been created for different needs. Important messages, delivered in a clear unambiguous way.

    35. Further E-Safety Resources Allied to this are the other E-Safety resources out there New games from NWLG, aimed at upper KS2, with very scenarios/questions to consider. Very popular amongst pupils. SMART Crew lower KS2 excellent way to introduce the SMART rulesAllied to this are the other E-Safety resources out there New games from NWLG, aimed at upper KS2, with very scenarios/questions to consider. Very popular amongst pupils. SMART Crew lower KS2 excellent way to introduce the SMART rules

    36. Resources to support E-Safety- themed days or weeks Intended to support E-Safety themed days or weeks. Can be used for assemblies or group-based activities. Ideas for using on and offline resources.

    37. Where do I find them? From E-Safety home page, click on Curriculum tab.

    38. Keeping your Data Secure

    39. Data Handling Update Session builds on guidance developed by Becta and shared at last years events Set in the context of your schools legal responsibility to keep personal data safe and secure Development of guidance for Surrey schools in relation handling information and data There is a clear link between sound e-safety policies and practice with effective data handling Session builds on guidance developed by Becta. This was shared last year and on www.surreylearning/ictleaders website alongside questions for review Session builds on guidance developed by Becta. This was shared last year and on www.surreylearning/ictleaders website alongside questions for review

    40. Guidance includes the following: Key actions for schools Golden rules for staff Managing passwords Avoiding unauthorised access to data and information Data Handling Update

    41. Be aware of your responsibilities in relation to ensuring data and information is secure Know what sensitive data and information is in the school and who has access to it Ensure your school has policies, protocols in place, such as, a password policy Consider the place of protective marking of data and information and encryption of ICT equipment Key Actions for Schools Highlight following which are crucail Highlight following which are crucail

    42. The Golden Rules for Staff Include: Always keep your passwords secret Never access data unless you have a professional need to do so Always log off unattended PCs and laptops Never leave electronic equipment, such as laptop computers, or sensitive documents or papers in an unattended vehicle Always be aware of the sensitive nature of the data you are sending Ensure you double check who you are sending information to prior to sending Never hold data for longer than you need to and delete it when its use is no longer required Avoid the use of personal emails for professional use

    43. Passwords Passwords should consist of at least eight characters including a combination of capital letters, lower case letters and numbers Avoid creating passwords using: Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters, for example: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) Personal information, such as, your name, birthday, driver's licence, passport number, or similar information

    44. Avoiding unauthorised access To include: Use features within software, such as word to protect documents with passwords to prevent access Use your schools learning platform to provide secure access to data and information Dont click on links in unsolicited emails and only download files or programs from sources you trust Ask third parties how they will protect sensitive information once it has been passed to them Use encrypted portable storage devices Use encryption software on laptops to prevent access to files Keep your PCs and laptops up to date with the latest security updates

    45. Encryption Encryption is used to improve the security of a file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it Encryption is managed by changing plain text into mathematical logic, or algorithms Whole drives or disks can encrypted or just specific files and folders

    46. Sources of Guidance www.surreycc.gov.uk/safeguarding For e safety in guidance and protocols section Use of emails Information on SNet Including information of passwords

    47. Lots of Monitoring companies 4S have worked with Securus for 10 years Many Secondary schools use the Securus solution in their school. Some Primaries also have take it up. Securus have worked with a server based company Redstor, already known in Surrey, to provide a remote solution for Primary schools. Babcock 4S have worked with Redstor to create a price point that is practicable for schools. Safeguarding Software

    48. Computer monitoring software, installed on school computers, identifies a wide range of e-safety issues within online and offline applications.. Can have a AUP when first login Screenshot taken of any concern to show the context of what took place and who was involved. Requires oversight by senior leader KS1 get it for free in a primary school Reception/ KS1 not sold to on own Primary Securus Solution Operated by Redstor

    49. Price per pupil = 2.74 Minimum per school 228 Optional additional cost for installation and Training = 500 per school Cost for Surrey Schools

More Related