E Safety Policy (Students)

E Safety Policy (Students) Date of Last Review: May 2016 Reviewed by: Richard Beattie Agreed by Governors: 10 May 2016 Frequency of Review: Annually ...
3 downloads 0 Views 486KB Size
E Safety Policy (Students)

Date of Last Review: May 2016 Reviewed by: Richard Beattie Agreed by Governors: 10 May 2016 Frequency of Review: Annually Date of Next Review: May 2017

1

Contents Cover Contents Policy Statement Introduction and Principles Scope of Policy In Practice Published Content and the School Website Publishing Students’ Images and Work Communicating with Children and Young People (including the use of Technology) Sanctions for Inappropriate Use: Child/Young Person Adult (staff and volunteers) Complaints regarding eSafety

Appendices Appendix 1: Guidance Notes for Students Appendix 2: E–Safety Rules Appendix 3: Staff Information Systems Code of Conduct

2

Page 1 Page 2 Page 3 Page 4 Page 5 Page 5 Page 5 Page 5 Page 6 Page 7 Page 7 Page 7

Page 8 Page 9 Page 10

Policy Statement President Kennedy School’s eSafety Policy forms part of a wider whole school commitment to diversity, tolerance, acceptance and respect for all members of the community. This policy sets out how the school aims to promote eSafety through teaching and learning across the curriculum. The policy also aims to support, develop and guide young people so that they are able to make a positive contribution to the community to which they belong. We recognise that promoting eSafety is more than simply meeting a statutory obligation.

3

Introduction and Principles President Kennedy School recognises the Internet and other digital technologies provide a vast opportunity for children and young people to learn. The Internet and digital technologies allow all those involved in the education of children and young people to promote creativity, stimulate awareness and enhance learning. The school has made a huge investment in the last few years because it believes that the use of such technologies has an important role in raising student achievement. At present the school has:  A 24 hour portal or learning gateway  All staff and students have access to the portal through a username and password  All staff and students have their own e mail account  A range of mobile technology, including laptops, digital cameras and a recording studio. Over the next few years the range and sophistication of the technology will widen greatly. As part of our commitment to learning and achievement we want to ensure that the Internet and other digital technologies are used to:    

Raise educational standards and promote pupil achievement. Develop the curriculum and make learning exciting and purposeful. Unable pupils to gain access to a wide span of knowledge in a way that ensures their safety and security. Enhance and enrich their lives and understanding.

We believe that there should be an equitable learning experience for all pupils using ICT technology, within the school and outside the school. We take part in the local authority scheme which enables students to have free access to hardware and broadband at home. We are committed to ensuring that all its pupils will be able to use existing, as well as up and coming technologies safely. We are also committed to ensuring that all those who work with children and young people, as well as their parents, are educated as to the risks that exist so that they can take an active part in safeguarding children. Our safeguarding duties mean that we aim to make sure that pupils are  safe from maltreatment, neglect, violence and sexual exploitation  safe from accidental injury and death  safe from bullying and discrimination  safe from crime and anti-social behaviour in and out of school  secure, stable and cared for. Much of these aims apply equally to the ‘virtual world’ that children and young people will encounter whenever they use ICT in its various forms. For example, we know that the internet has been used for grooming children and young people with the ultimate aim of exploiting them sexually; we know that ICT can offer new weapons for bullies, who may torment their victims via websites or text messages; and we know that children and young people have been exposed to inappropriate content when online, which can sometimes lead to their involvement in crime and anti-social behaviour.

4

It is the duty of the school to ensure that every child in their care is safe, and the same principles should apply to the ‘virtual’ or digital world as would be applied to the school’s physical buildings. The use of such technology is also vital in the work of staff. It enables them to carry out their curriculum and administrative work in a more efficient and effective manner and is a great aid to professional development. The nominated senior person for the implementation of the School’s e-Safety policy is:  School Business Manager  Network Manager Scope of Policy The policy applies to all:  Pupils;  Teaching and support staff (including peripatetic), school governors and volunteers;  Aspects of the School’s facilities where they are used by voluntary, statutory or community organisations . In Practice We will ensure that the following elements are in place as part of its safeguarding responsibilities to pupils:  an acceptable use policy for both staff and pupils - rules for the use of the internet and technology by pupils will be posted in all appropriate areas (See Appendices 1 and 2), and staff will sign the appropriate code of conduct (See Appendix 3) which will form part of the general code of conduct for staff.  advice and information on e safety will be part of the discrete ICT curriculum  information to parents that highlights safe practice for children and young people when using the Internet and other digital technologies;  adequate training for staff and volunteers;  adequate supervision of pupils when using the Internet and digital technologies;  education that is aimed at ensuring safe use of Internet and digital technologies;  the use of filtering software (Redstone) to ensure that inappropriate sites are unavailable through the portal  the school will block access to social networking sites  the use of monitoring software (Lanschool etc) to detect any inappropriate use of the network and portal  a reporting procedure for abuse and misuse. Published Content and the School Web Site The contact details on the Web site will be the school address, e-mail and telephone number. Staff or pupils personal information will not be published The Headteacher and Network Manager will take overall editorial responsibility and ensure that content is accurate and appropriate

5

Publishing Students’ Images and Work 

   

Photography and Video: Working with children and young people may involve the taking or recording of images. Any such work should take place with due regard to the law and the need to safeguard the privacy, dignity, safety and well being of children and young people. Informed written consent from parents or carers and agreement, where possible, from the child or young person, should always be sought before an image is taken for any purpose. Care should be taken to ensure that all parties understand the implications of the image being taken especially if it is to be used for any publicity purposes or published in the media, or on the Internet. Photographs that include students will be selected carefully and will be appropriate for the context Students’ full names will not be used anywhere on the Web site particularly in association with photographs Written permission from parents or carers will be obtained annually before photographs of students are published on the school Web site Work can only be published with the permission of the student and parents

Access to inappropriate images and Internet usage There are no circumstances that will justify adults possessing indecent images of children. Adults who access and possess links to such websites will be viewed as a significant and potential threat to children. Accessing, making and storing indecent images of children on the internet is illegal. This will lead to criminal investigation and the individual being barred from working with children and young people, if proven. Adults should not use equipment belonging to their organisation to access adult pornography; neither should personal equipment containing these images or links to them be brought into the workplace. This will raise serious concerns about the suitability of the adult to continue to work with children. Adults should ensure that children and young people are not exposed to any inappropriate images or web links. Organisations and adults need to ensure that internet equipment used by children have the appropriate controls with regards to access. e.g. personal passwords should be kept confidential. Where indecent images of children or other unsuitable material are found, the CP Officer should be immediately informed Communicating with children and young people (including the use of technology) Communication between children and adults, by whatever method, should take place within clear and explicit professional boundaries. This includes the wider use of technology such as mobile phones text messaging, e-mails, digital cameras, videos, web-cams, websites and blogs. Adults should not share any personal information with a child or young person. They should not request, or respond to, any personal information from the child/young person, other than that which might be appropriate as part of their professional role. Adults should ensure that all communications are transparent and open to scrutiny.

6

Adults should also be circumspect in their communications with children so as to avoid any possible misinterpretation of their motives or any behaviour which could be construed as grooming. They should not give their personal contact details to children and young people including e-mail, home or mobile telephone numbers, unless the need to do so is agreed with senior management and parents/carers. E-mail or text communications between an adult and a child young person outside agreed protocols may lead to disciplinary and/or criminal investigations. This also includes communications through internet based web sites. (See the general code of conduct for staff) Sanctions for inappropriate use 

Child / Young Person o The pupil will be disciplined according to the behaviour policy of the school. This could involve interview/counselling by tutor / Head of Year / e-Safety Coordinator / Headteacher. Parents/carers would be informed. It could ultimately include the use of Internet and email being withdrawn. o Serious breaches may lead to the incident being reported to the Police or other regulatory bodies, for instance, illegal Internet use or child protection concerns.



Adult (Staff and Volunteers) o The adult may be subject to the disciplinary process, if it is deemed he/she has breached the policy o Serious breaches may lead to the incident being reported to the Police or other regulatory bodies, for instance, illegal Internet use or child protection If inappropriate material is accessed, users are required to immediately report this to the e safety coordinator and/or CPO if appropriate

Complaints regarding e-Safety Our e-Safety Coordinator acts as first point of contact for any complaint. Any complaint about staff misuse is referred to the Headteacher. Complaints of cyberbullying are dealt with in accordance with our Anti-Bullying Policy. Complaints related to child protection are dealt with in accordance with school / LA child protection procedures.

7

Appendix 1 Guidance notes for students When I am using the computer or other technologies, I want to feel safe all the time. . I agree that I will:  always keep my passwords a secret  only visit sites which are appropriate to my work at the time  work in collaboration only with friends and I will deny access to others  tell a responsible adult straight away if anything makes me feel scared or uncomfortable online  make sure all messages I send are respectful  show a responsible adult if I get an inappropriate message or get sent anything that makes me feel uncomfortable  not reply to any an inappropriate message or anything which makes me feel uncomfortable  not give my mobile phone number to anyone who is not a friend  only email people I know or those approved by a responsible adult  only use email which has been provided by school  talk to a responsible adult before joining chat rooms or networking sites  always keep my personal details private. (My name, family information, journey to school, my pets and hobbies are all examples of personal details)  always check with a responsible adult and my parents before I show photographs of myself  never meet an online friend without taking a responsible adult that I know with me

8

Appendix 2

E - Safety Rules (for students) These e-Safety Rules help to protect students and the school by describing acceptable and unacceptable computer use. 

The school owns the computer network and can set rules for its use.



It is a criminal offence to use a computer or network for a purpose not permitted by the school.



Irresponsible use may result in the loss of network or Internet access.



Network access must be made via the user’s authorised account and password, which must not be given to any other person.



All network and Internet use must be appropriate to education.



Copyright and intellectual property rights must be respected.



Messages shall be written carefully and politely, particularly as email could be forwarded to unintended readers.



Anonymous messages and chain letters are not permitted.



Users must take care not to reveal personal information through email, personal publishing, blogs or messaging.



The school ICT systems may not be used for private purposes, unless the head teacher has given specific permission.



Use for personal financial gain, gambling, political activity, advertising or illegal purposes is not permitted.

The school will exercise its right to monitor the use of the school’s computer systems, including access to web-sites, the interception of e-mail and the deletion of inappropriate materials where it believes unauthorised use of the school’s computer system may be taking place, or the system may be being used for criminal purposes or for storing unauthorised or unlawful text, imagery or sound.

9

Appendix 3 Staff Information Systems Code of Conduct To ensure that staff are fully aware of their professional responsibilities when using information systems, they are asked to sign this code of conduct. Staff should consult the school’s e-safety policy for further information and clarification. 

The information systems are school property and I understand that it is a criminal offence to use a computer for a purpose not permitted by its owner.



I will ensure that my information systems use will always be compatible with my professional role.



I understand that school information systems may not be used for private purposes, without specific permission from the Headteacher.



I understand that the school may monitor my information systems and Internet use to ensure policy compliance.



I will respect system security and I will not disclose any password or security information to anyone other than an appropriate system manager.



I will not install any software or hardware without permission.



I will ensure that personal data is kept secure and is used appropriately, whether in school, taken off the school premises or accessed remotely.



I will respect copyright and intellectual property rights.



I will report any incidents of concern regarding children’s safety to the school e-Safety Coordinator or the Designated Child Protection Coordinator.



I will ensure that any electronic communications with students are compatible with my professional rôle.



I will promote e-safety with students in my care and will help them to develop a responsible attitude to system use and to the content they access or create.

The school may exercise its right to monitor the use of the school’s information systems, including Internet access, the interception of e-mail and the deletion of inappropriate materials where it believes unauthorised use of the school’s information system may be taking place, or the system may be being used for criminal purposes or for storing unauthorised or unlawful text, imagery or sound.

10