eSafety Masterclass: Unders tanding Safeguarding Obligations

Welcome • • • •

Thank you for your time Our s hared goal: Protecting children online Topics covered: Radicalis ation, Mental health, Sexual Abus e, Social media Feedback

Pleas e follow us on Twitter @Smoothwall and us e #SmoothwalleSafetyRoads how

Agenda 09:30 Regis tration and Refres hments 10:00 Keynote Speaker – Learning from my mis takes Tommy Lawson, Education Officer 11:00 Refres hment Break 11:15 Online Safety Works hop for Teachers & Staff: Whos e Digital Res pons ibility is it? Jonathan Taylor, Social Media & Online Safety Cons ultant 12:15 Lunch 13:15 Utilizing e-Safety innovations to meet challenging s afeguarding is s ues Tanja Erhardt, Product Owner at Smoothwall 14:15 Refres hments 14:30 Networking and Dis cus s ion 15:30 End of Ses s ions

LEARNING FROM MY MISTAKES E-SAFETY MASTERCLASS - SMOOTHWALL

MY BACKGROUND

• Teacher with 35 years service • Maths Teacher – 2 years • Head of Computing – 7 years • Deputy Head – 9 years • Education Officer (Curricular ICT) – 15 years • Education Officer (Learning Technology) - 2 years • CEOP Ambassador – 6 years • Filter management – 18 years • Investigating Officer – 17 years

HISTORY OF ‘INTERNET’ USE IN SCHOOLS

BEGINNING OF SCHOOL FILTERING AS WE KNOW IT

20 years ago

PERSONAL JOURNEY

IGEAR

N2H2 Smoothwall

EARLY URL AND KEYWORD FILTERS

One million blocked websites

Ass Assessment Scunthorpe Penistone

TECHNICAL JOURNEY

THE CURRICULUM AND THE INTERNET

decade 1

THE CURRICULUM AND THE INTERNET

decade 2

THE CURRICULUM AND THE INTERNET

decade 3

CURRICULUM VS SAFER INTERNET

CURRICULUM VS SAFER INTERNET - CONTENT

Curriculum for Excellence Digital Learning

CURRICULUM VS SAFER INTERNET - BEHAVIOUR

GIRFEC Child Protection

MANAGING THE FILTER

MANAGING THE FILTER - TECHNICAL HARD & SOFT

MANAGING THE FILTER - CURRICULAR

MANAGING THE FILTER – PARTNERSHIP

DIGITAL LEARNING – THE FUTURE

Online Safety Workshop for Teachers & Staff Whose Digital Responsibility is it anyway ? Parent, Practitioner or Children Social Media & the Dangers Jonathan Taylor MSc E-mail: [email protected] www: www.besafe-online.co.uk @Besafe_Online

What is Expected of ALL Schools / Colleges / Academies? Training / Workshops Controlled i. Online Safety CPD Training for ALL Staff ii. Whole year group presentations on Online Safety & Social Media / Gaming awareness iii. Online Safety Policy iv. AUP (acceptable use policies / agreements) v. Filtering & Monitoring of Schools Internet Access Offered not Controlled i. Parental Information Evenings Optional but Advised i. OSO (Online Safety Officers) ii. BYOD Days iii. Social Media Questionnaire (ICT / PSHE)

Online Safety Options Open to ‘Society’

©

Educate Parents / Carers on the possibility of Risk-Danger-Harm through online interaction by Children, as a result of Inappropriate Contact-Content-Conduct.

• Parents / Carers

ENCOURAGE - DIALOGUE & ONLINE PARTICIPATION

• Educators

Educate ‘educators’ on online trends of children , social media File sharing, gaming, etc that MAY result in Danger & Harm from sexual, physical, emotional, psychological or reputational exploitation ENCOURAGE - DIALOGUE & ‘BYOD’ DAYS & UNSTANDING VULNERABILITY

• Industry/Organisations

Educate all on online trends that can assist in effective, policing, and understanding of the Risks & vulnerablity that can escalate to Danger & subsequent Harm. Furthermore encouraging dialogue, blocking & filtering. & co-operation ENCOURAGE - DIALOGUE & CO-OPERATION All users should be educated about the difference between Risk-Danger-Harm & the possibility of Danger through 3 C’s & possible subsequent exploitation

• Children / Young Adults

ENCOURAGE - EMPOWERMENT UNDERSTANDING DIALOGUE WITH PARENT/CARERS/TEACHERS

SCHOOLS

In the context of an inspection, e-safety may be described as the school’s ability: to protect and educate pupils and staff in their use of technology to have the appropriate mechanisms to intervene and support any incident where appropriate.

Inspection of education and online safety from September 2015

Inspecting safeguarding In relation to children and young people, safeguarding and promoting their welfare is defined in ‘Working together to safeguard children’ as:  protecting children from maltreatment  preventing impairment of children’s health or development  ensuring that children are growing up in circumstances consistent with the provision of safe and effective care  taking action to enable all children to have the best outcomes.

Definition of safeguarding (extract paras 10 and 11)

Safeguarding action may be needed to protect children and learners from:  bullying, including online bullying and prejudice-based bullying  the impact of new technologies on sexual behaviour, for example sexting Safeguarding is not just about protecting children, learners and vulnerable adults from deliberate harm, neglect and failure to act. It relates to broader aspects of care and education, including:  online safety and associated issues The term ‘online safety’ reflects a widening range of issues associated with technology and a user’s access to content, contact with others and behavioural issues.

The signs of successful safeguarding arrangements (extract para 13) In settings that have effective safeguarding arrangements, there will be evidence of the following:  Adults understand the risks posed by adults or learners who use technology, including the internet, to bully, groom, radicalise or abuse children or learners. They have well-developed strategies in place to keep children and learners safe and to support them to develop their own understanding of these risks and in learning how to keep themselves and others safe.  Leaders oversee the safe use of technology when children and learners are in their care and take action immediately if they are concerned about bullying or children’s well-being. Leaders of early years settings implement the required policies with regard to the safe use of mobile phones and cameras in settings.

Inspecting how effectively leaders and governors create a safeguarding culture in the setting (extract para 18) Inspectors will want to consider evidence that:  staff, leaders and managers understand the risks posed by adults or young people who use the internet to bully, groom or abuse children, young people and vulnerable adults  there are well-developed strategies in place to keep learners safe and to support them in learning how to keep themselves safe  staff, leaders and managers oversee the safe use of electronic and social media by staff and learners and take action immediately if they are concerned about bullying or risky behaviours

Empowerment



Questions for Years 2 -13



1.

How Many students use an IPad / Iphone? How Many use an Android Tablet / Mobile?



2

How many have asked 'Siri' a 'silly' question?



3.

How many use Whats App?



4.

How Many use Facebook / Instagram / OoVoo?



5.

How many have heard of Line / We Chat / Tango / Team Speak?



6.

How Many use X-Box / Play Station - GTA / Assassin / Fifa 16 / Destiny / Call of Duty?



7

How Many have heard of Talking Angela / Slender Man / Bloody Mary?



8.

How many play online games with their parents?



9.

How many are able to install apps, how many know their parents Apple Id password?



10

How many play online games with 'headphones & microphones'?



11.

How many know 'You Tubers' if so who do they follow.? eg Miranda Sings / Stampy



12.

If you heard or saw something inappropriate on a site / app / game / or messaging service

• •

who would you tell.....? 13.

Are you aware of Google Data Retention via device usage

AGE RESTRICTIONS ?

Risks In Everything Online – HoweverOnly Dangerous as a Result of Inapproriate Content / Contact / Conduct I. II.

Social Media / Access & Usage Social Networking – Interaction Sites & Apps

III.

Sexting / Sexcasting (Sexy Selfie)

IV.

Cyberbullying / Trolling / Revenge

V.

Online Reputation / Digital Tattoo

Must Understand Online Behaviour to Understand Risk & Prevent Escalation MUST DEFINE ACCURATELY TO EDUCATE EFFECTIVELY

Social Media

- Risk – Danger - Harm

Risk

Downloading and use of Apps or websites Windows – IOS – Android – Fire etc

Danger

Illegal or Inappropriate Online behaviour Content – Contact - Conduct

Harm

Emotional Sexual Physical Online Exploitation Online Reputation Damage - Radicalisation Illegal Behaviour

If you can describe risk & explain risk you are in a better position to protect and control it’ Minimising Risk can Reduce the Escalation to Danger which in turn drastically Reduces possible Harm

Risks can lead to Dangers can lead to Harm Harm = Exploitation

including:

Physical Exploitation Sexual Exploitation Emotional Exploitation Reputation Damage Radicalisation / Extremism Bullying Identity theft / Illegal behaviour Exposure to inappropriate content Obsessive use of ICT Copyright infringements

Social Media & Technological ‘Game Changers’ Online Behaviour Web Sites – Anonymity Web Cam Abuse – Video Chat Sites Direct Messaging Viruses Devices Connectivity Accessibility Apps Operating Systems – iOS / Windows / Android

Ask.FM / TOR / VPN (Silk Road) Omegle / Badoo (Deliberate / Virus) WhatsApp/WeChat/Line/Viber/Tango -GPS Peer 2 Peer / RAT PC/Tablet/Smart Phone/Smart TV/ Gaming Free - 24/7 – 3g / 4g Free 24/7 Interaction / Random Play (etc)

Google Data Retention

3 C’s Content – Contact – Content Social Media

Risk – Danger – Harm

Inappropriate / Illegal Behaviour Social Networking (FB – Instagram) Apps (Snapchat – OoVoo) Gaming (+ Direct Messaging) Results Recognise & Control RISK Reduce Escalation towards DANGER Eliminate HARM

You Tubers (Social Media Addiction ?) Oli White

Jim Chapman

NikiNSammy

Zalfie (Alfie Deyes) Pointless Blog

Joe Sugg & Casper Lee

StampyTyler Oakley

(Binge)

PewDiePie

Zoella

Risks – Danger - Harm Operating Systems

Issues with G Mail & Google +

Photo DNA

Case Studies

What are ‘you’ doing online? Online Gaming i. Playing games against friends and strangers. ii. Chatting to friends and strangers using microphone headsets. iii. Exchanging contact details. iv. Playing games unsuitable for their age? v. Tiredness v Addiction

Grand Theft Auto – Inappropriate Content Visual & Audio

Risks Through Technology? Mobiles / Tablets i. Using GPS – Location Services (Google Services ii. Accessing the internet using 3G/4G technology. iii. Sending and receiving photos and videos. iv. Using instant messaging. (BBM, Whatsapp, iMessage) v. Sharing personal information. vi. Be aware of in-app purchases vii. Be aware Gmail (Google Data Retention) viii. Be aware Apps (Random Play - Interaction) ix. Facial Recognition / Photo DNA x. Anonymity (Sites Apps VPN) xi. Tinder v We Chat

https://free.echosec.net/

https://www.google.co.uk/maps/timeline?authuser=0&pb=!1m9!2m8!1m3!1i1990!2i0!3i1!2m3!1i2090!2i0!3i1!2m2!6b1!7b1!3m10 !1m9!2m8!1m3!1i2015!2i5!3i2!2m3!1i2015!2i8!3i30!5m0!6b1

Privacy Settings Set – But GPS on when Tweets Posted

Webcam Issues Convincing young people into doing Inappropriate Acts on webcam. Exploitation from Deliberate Inappropriate Use Exploitation from Unknown Webcam Access Victims - can happen to boys and girls. Remote Baby Monitor Access & Recording- Viruses

Video Sharing Sites Popular video-sharing sites/Apps: • YouTube • Vimeo • Justin.tv • Oovoo • Vine • Keek • You Now • Kik Video • Periscope • Chat Roulette / Omegle / Cam Frog etc Users view and post videos (live or archived) Post and read comments about the video content.

Inappropriate Conduct?

i. ii.

iii. iv. v. vi.

vii. viii. ix.

Bullying someone using technology. It is a big problem having migrated from Messaging to Apps (DM’s). It can start off as a joke and spiral out of control. Fraping always an issue It can be very malicious. Adults and young people think that because its online it gives then anonymity. It now almost always involves ‘The Camera’ Mostly through Apps (YikYak – Street Chat) Revenge Porn

A photograph that one takes of oneself with a digital camera or a front-facing smartphone, tablet or webcam, especially for posting on a social-networking or photo sharing website.

Where are they commonly used?

What are the risks?

SexySexting Selfie (Self Generated Images) i.

ii. iii.

iv.

Sending rude / explicit photos via email, social media, Apps and mobiles. Sending videos or exposing themselves on webcam Once they have been sent they can be put online or shared with anybody. It is against the law if you have a explicit photo of someone under the age of 18 even if they are not 18 themselves. It does not matter if they are a boyfriend or girlfriend. Sexy Selfie or Inappropriate Image IPhone – Android ?????

Why do kids/young adults send ‘sexy selfies’? Teen “romance” – expression of feelings Intimacy with partner Flirting / Prank / Joke Showing off (party behaviour) “So take a dirty Impulsive risk-taking picture for me, Take a dirty Peer pressure picture Just take a dirty Revenge picture for me Take a dirty Bullying or intimidation picture” Blackmail

‘Coz they Can’

From Taio Cruz song

Sexting (Sexy Selfie) Research I.

I.

I.

Analysis responses from 30 UK schools, years 7-9, 1,150 students (boys & girls) in total. Asked questions regarding attitudes toward and behaviours around sexting, taking & receiving images. Questioned as to what they believe would be construed as Inappropriate

Your Digital Tattoo In A Social Media World Protecting and building your digital resume online

What do Apple, Facebook, and Google Know About You?

Facebook

Google Location On – Google Tracks History On – Google Tracks hourlydaily-monthly activity- top clicks / queries/sites Age, gender, predicts your interests. Tracks devices you use & when last active – Tracks how many emails sent and how many contacts/ documents you have- Tracks all talk accounts

Name – Birthplace – City of Residence – Phone – Email – Current Employment – Relationship - Anniversary – Previous Relationships – Aliases- Screen names- Address Book – Family members – Religious Views + Much More (Like Button is Tracked ) FB Apps know who you are talking with etc Apple allowed to share, sell, store info how it likes Name – Address – Email – Credit Card Details – Employment – Real time location – Habits – Use Cookies for Advertising – Tracks Safari pages – SiRi – is recorded sent to Apple and transcribed to process request Contacts – Songs LOCATION LOCATION

Apple

Your Digital Tattoo Employer background check What if a future employer / university decides to check your online profile?  What information will they find?  Is the information positive or negative?  Is the information wrong or outdated?  Where will they look for information?  Google  Facebook  LinkedIn  Twitter  Other social media (Sites & Apps) channels  Amazon / Ebay  Online Groups and Organisations Future employers search recruits through search engines and social networking sites before offering them jobs – happened to me

Why employers disregarded candidates? Posted provocative inappropriate photo

53%

Why employers disregarded candidates? Posted Inappropriate Content - comments – drinking / drugs / hate

44%

'I have fallen into the trap of behaving with bravado on social networking sites. 'I hope this may stand as a learning experience for any other young people.’

Exploitation - Radicalisation HOW SOCIAL MEDIA IS USED TO ENCOURAGE TRAVEL TO SYRIA AND IRAQ 1. 2. 3.

Key Role to play in preventing – ‘Prevent Priority Area’ Speak to Prevent Lead or Police Channel Programme – ‘Being Drawn into Terrorism

SOCIAL MEDIA Platforms

Exploitation - Radicalisation Facebook ISIL Supporters use FB to share content, stories & You Tube videos among peer groups

Twitter Popular platform for Pro-ISIL accounts & those sharing ISIL propaganda – easy & anonymous & large audience

Instagram Used by ISIL fighters & supporters to share photos – produced by ISIL Media Organisations

Messaging WhatsApp, Kik, Surespot, Viber. Line, WeChat etc- ISIL use closed peer-2-peer networks for sensitive information

You Tube ISIL Supporters use YT to host videos both official and created, Dummy accounts used to repost After ‘Take Downs’ Ask.FM ISIL Supporters use ASK especially when asking Questions of British jihadis & female supporters About living standards, travel arrangements, Ideology , recruitment & fighting

‘E-safety & Cyber Abuse – the Current Issues and Schools & Ofsteds Expectations

E-Safety & Online Etiquette for Colleagues Jonathan Taylor MSc E-mail: [email protected] www: www.besafe-online.co.uk @Besafe_Online

Ofsted definition of Online Safety

A school’s ability to protect and educate pupils and staff in their use of technology and to have the appropriate mechanisms to intervene and support any incident where appropriate. They identify three areas of risk: Content, Contact, Conduct

Keeping Personal Information Private Who is looking at you online?

UNDERSTAND YOUR PRIVACY RIGHTS NOT protected by Expectation of Privacy  Matters of personal concern, e.g. Social activities Personal gripes Partying

Resigned

Suspended

CENSORED

Dismissed

Dismissed

CODE OF PROFESSIONAL CONDUCT Never joke about taking any kind of violent action

Fired

Disciplined

DON’T POST ANYTHING INAPPROPRIATE Refrain from:  Profanity  Obscenity  Images with you drinking, using drugs, in questionable settings, with disreputable companions, in inappropriate attire, or engaging in illegal activities  Anything that depicts you in an unfavourable light

DON’T VENT ABOUT SCHOOL ONLINE NEVER tell stories about work that include personally identifiable details or information protected law.

Fired

What is Expected of ALL Schools / Colleges / Academies? Training / Workshops Controlled i. Online Safety CPD Training for ALL Staff ii. Whole year group presentations on Online Safety & Social Media / Gaming awareness iii. Online Safety Policy iv. AUP (acceptable use policies / agreements) v. Filtering & Monitoring of Schools Internet Access Offered not Controlled i. Parental Information Evenings Optional but Advised i. OSO (Online Safety Officers) ii. BYOD Days iii. Social Media Questionnaire (ICT / PSHE)

Schools Training (Pupil / Staff / Parent) Years 1-4 Online Respect ‘Zip It’ ‘Block It’ ‘Flag It’ (Lee & Kim )(Smart Crew), highlighting the issues of sharing information using PC’s, Mobiles, Tablets Gaming Devices. These are bespoke assemblies / presentations for Years 1 & 2 – Years 3 & 4 explaining risks of sharing too much information, how to block nasty messages and who to speak to. Years 5-6 Social Media & The Dangers , Cyberbullying – Reputation. A bespoke assembly / presentation for Years 5 & 6, highlighting the issues of Risk – Danger – Harm, through online interaction on PC’s, IoS & Android Devices and how to create a positive Online Digital Tattoo Years 7-8 Safely Navigating Uncharted Waters- Social networking / Sexting / Trolling / Digital Tattoo – Staying Safe Online. Assembly highlighting how Risk can elevate to Danger and possible subsequent harm, through Inappropriate Contact – Conduct – Content, and understanding Cyber Vetting and the importance of Digital Tattoos.

Schools Training Years 9-10 Risks and consequences of sharing personal and inappropriate information on the Internet and Social Media- Sexting to Reputation. Assembly highlighting how Risk can elevate to Danger and possible subsequent harm, through Inappropriate Contact – Conduct – Content, and understanding Cyber Vetting and its importance. Years 11-13 Online Reputation- How a Positive Digital Tattoo is created & protected & how it can affect their future education and employment – through Cyber Vetting. Possibilities of online Radicalisation through Social Media Social Media Awareness for Staff An insight into the online behaviour of students from Year 1 to Year 13, highlighting the challenges of Risky Online Behaviour which may lead to Cyberbullying - Sexting Damage to Online Digital Reputation & Radicalisation. Defining the new phenomenon of the Digital Natives. Personal or professional; keeping yourself and the school risk free. Parental Engagement As with staff, a good awareness of the child protection risks related to Online Safety, but this time more tailored to a home environment. This is a 90-minute session for parents and guardians into social media & Online - Safety issues and risks to children whilst using digital technology. This is also an opportunity for parents to ask for advice

‘Understanding & Minimising Risk can Reduce the Escalation to Danger which in turn drastically Reduces the possibility of Exploitation’

Thank you! Jonathan Taylor MSc E-mail: [email protected] Web Site : www.besafe-online.co.uk @Besafe_Online

Latest e- Safety Functionality Tanja Erhardt – Product Ow ner

Background • Children Act 20 0 4 • Protect from issues such as abuse, substance misuse, bullying, radicalisation

• Counter- Terrorism and Security Act 20 15 • Increased emphasis on protecting children from radicalisation (Prevent strategy)

• Draft: Keeping Children Safe in Education • Statutory guidance

• Internet evolution from 20 0 4 • W eb sites, collaborative web, secure web, ever- smarter anonymous proxies

A Path to Good Intentions Leads to a hellish problem for schools Specified authorities w ill be expected to ensure children are safe from terrorist and extremist material w hen accessing the internet in school, including by establishing appropriate levels of filtering. …staff have training that gives them the know ledge and confidence to identify children at risk of being draw n into terrorism… …encourage and support schools to move from locked dow n to managed [e- safety] systems…

W hilst it is essential that governing bodies and proprietors ensure that appropriate filters and monitoring systems are in place; they should be careful that “over blocking” does not lead to unreasonable restrictions as to w hat children can be taught w ith regards to online teaching and safeguarding

Terrorism Al Qaeda Terror Attack Iraq Afghanistan Iran Pakistan Agro Environmental terrorist Eco terrorism Conventional w eapon Target W eapons grade Dirty bomb Enriched Nuclear Chemical w eapon Biological w eapon Ammonium nitrate Improvised explosive device

IED AQAP AQIM Abu Sayyaf Hamas FARC IRA ETA Basque Separatists Hezbollah Tamil Tigers PLF PLO Organization Car bomb Jihad Taliban W eapons cache Suicide bomber Suicide attack Suspicious substance

TTP Yemen Pirates Extremism Somalia Nigeria Radicals Al- Shabaab Nationalist Recruitment Fundamentalism Radical Radicalised Islamist ISIS ISIL Islamic State Jihadi Boko Haram Daesh

Terrorism Al Qaeda Terror Attack Iraq Afghanistan Iran Pakistan Agro Environmental terrorist Eco terrorism Conventional w eapon Target W eapons grade Dirty bomb Enriched Nuclear Chemical w eapon Biological w eapon Ammonium nitrate Improvised explosive device

IED AQAP AQIM Abu Sayyaf Hamas FARC IRA ETA Basque Separatists Hezbollah Tamil Tigers PLF PLO Organization Car bomb Jihad Taliban W eapons cache Suicide bomber Suicide attack Suspicious substance

TTP Yemen Pirates Extremism Somalia Nigeria Radicals Al- Shabaab Nationalist Recruitment Fundamentalism Radical Radicalised Islamist ISIS ISIL Islamic State Jihadi Boko Haram Daesh

Ofsted Inspection Considers… …how w ell the school prepares pupils positively for life in modern Britain and promotes the fundamental British values of democracy, the rule of law , individual liberty and mutual respect for and tolerance of those w ith different faiths and beliefs and for those w ithout faith…

…how w ell leaders and governors promote all forms of equality and foster greater understanding of and respect for people of all faiths (and those of no faith), races, genders, ages, disability and sexual orientations (and other groups w ith protected characteristics)…

Ofsted Inspection Considers… …how w ell the school prepares pupils positively for life in modern Britain and promotes the fundamental British values of democracy, the rule of law , individual liberty and mutual respect for and tolerance of those w ith different faiths and beliefs and for those w ithout faith…

…the effectiveness of safeguarding

…how w ell leaders and governors promote all forms of equality and foster greater understanding of and respect for people of all faiths (and those of no faith), races, genders, ages, disability and sexual orientations (and other groups w ith protected characteristics)… …the effectiveness of leaders’ and governors’ w ork to raise aw areness and keep pupils safe from the dangers of abuse, sexual exploitation, radicalisation and extremism and w hat the staff do w hen they suspect that pupils are vulnerable to these issues.

Extended Chain of Trust Filtering supplier

The tools

System administrator

The systems

Individuals holding legal responsibility

The reports

Filtering in 2016 URL filtering Egress filtering

SSL inspection

Search term filtering

Content inspection Content modification

W hat level of performance is required in w eb filtering to meet and exceed the legal thresholds for delivering suitable protection?

Filtering in 2016 URL filtering Egress filtering

SSL inspection

Blocking Content inspection

Search term filtering

Content modification

=

Event

Filtering in 2016 …the effectiveness of leaders’ and governors’ w ork to raise aw areness and keep pupils safe from the dangers of abuse, sexual exploitation, radicalisation and extremism and w hat the staff do w hen they suspect that pupils are vulnerable to these issues.

Monitoring

=

Intent

Safeguarding

Blocking + Monitoring

= =

Event + Intent

Intent • Search terms (allow ed as w ell as blocked) • Search terms follow ed by domain requests • Social netw orking POST requests • Capturing full content from POST requests • Instant messaging • Email content

Building A Picture

Main Features - Framlingham • Categorised breach reports • Seven categories • Three severities

• Automatic ranking system • Analyses both allow ed and blocked data • URLs • Search terms/ phrases

• Detailed context view • Email alerting • Summaries

Main Features - Glamis • User portal access • Access to all reports for teachers and safeguarding officers

• Comprehensive email reports • Full details from top level report

• Local exclusions • Improving reporting data

2016: Glamis Safeguarding enhancements :

Safeguarding in the portal: Sys tem adminis trators can now enable s taff, s uch as the s afeguarding officer, to run reports thems elves , and drill down into the detailed view previous ly only available through the Admin UI.

2016: Glamis Safeguarding enhancements :

2016: Glamis Safeguarding enhancements :

Full details on daily summary reports Daily full report s ummaries now includes full us er breach his tory

2016: Glamis-1 Safeguarding enhancements :

Safeguarding exclusion list:

Resources Smoothw all Safeguarding Community tinyurl.com/ j7aj85h

Thank you!