E-Safety Policy

E-Safety Policy

Revision History

Version Date Comments Review Date
8 Autumn 2015 Amended, approved and issued Autumn 2016
7 Autumn 2014 Amended, approved and issued Autumn 2015
6 Autumn 2013 Amended, approved and issued Autumn 2014
5 Spring 2013 Amended, approved and issued Spring 2014
4 Spring 2012 Amended, approved and issued Spring 2013
3 May 2010 Amended, approved and issued Spring 2012
2 March 2009 Approved and issued March 2011
1 March 2009 First draft

E-Safety Policy

E-Safety encompasses Internet technologies and electronic communications such as mobile phones and other internet enabled devices eg Xbox, Wii, Ipad’s and games consoles as well as collaboration tools and personal publishing. It highlights the need to educate pupils about the benefits and risks of using technology and provides safeguards and awareness for users to enable them to control their online experience.

The school’s e-safety policy will operate in conjunction with other policies including those for Student Behaviour, Bullying, Curriculum, Data Protection and Security.

The C&YP Core e-Safety Policy

This core e-safety policy provides the essential minimal school e-safety policy and has been approved by the Children and Young People’s Services. C&YP considers that all the elements with a bullet are mandatory in order to protect users, the school and Stoke-on-Trent City Council.

Optional elements, marked with a round bullet, may be added if appropriate.

End to End e-Safety

E-Safety depends on effective practice at a number of levels:

  • Responsible ICT use by all staff and students, encouraged by education and made explicit through published policies.
  • Sound implementation of e-safety policy in both administration and curriculum, including secure school network design and use.
  • Safe and secure broadband from the Stoke-on-Trent Education WAN including the effective management of Websense filtering.
  • National Education Network standards and specifications.

Further Information

­­­E-Safety materials and curriculum e-safety advice
www.sgfl.org.uk/e-safety

School e-safety policy

The image005 bullets below are the essential minimum points for a school e‑Safety Policy.

The image005 elements enable a school to demonstrate that its e-Safety Policy is compliant with the C&YP approved policy. Naturally, policy must be translated into practice in order to protect pupils and educate them in responsible ICT use.

2.1 Writing and reviewing the e-safety policy

The e-Safety Policy is part of the School Development Plan and relates to other policies including those for ICT, Bullying and for Child Protection.
image005The school has a designated e-Safety Coordinator. This may be the Designated Child Protection Coordinator as the roles overlap.
image005Our e-Safety Policy has been written by the school, building on the Stoke-on-Trent e‑Safety Policy and government guidance. It has been agreed by senior management and approved by governors and the E-Safety committee.
image005The e-Safety Policy and its implementation will be reviewed annually.
image005The e-Safety Policy was revised by: Governor’s Curriculum Committee

2.2 Teaching and learning

2.2.1 Why are new technologies and Internet use important
image005The Internet is an essential element in 21st century life for education, business and social interaction. The school has a duty to provide students with quality Internet access as part of their learning experience.
image005Internet use is a part of the statutory curriculum and a necessary tool for staff and pupils.

2.2.2 Internet use will enhance learning
image005The school Internet access will be designed expressly for pupil use and will include filtering appropriate to the age of pupils.
image005Pupils will be taught what Internet use is acceptable and what is not and will be given clear objectives for Internet use.
image005Pupils will be educated in the effective use of the Internet in research, including the skills of effective knowledge location, retrieval and evaluation.

2.2.3 Pupils will be taught how to evaluate Internet content
image005The school will ensure that the copying and subsequent use of Internet derived materials by staff and pupils complies with copyright law.
image005Pupils should be taught to be critically aware of the materials they read and shown how to validate information before accepting its accuracy.

2.2.4 Pupils will be taught how to stay e-safe
image005Curriculum planning will include age appropriate opportunities to discuss, role play and learn about the benefits and risks offered by new technologies, such as e-mail, mobile phones and social networking sites.
image005E-safety delivery will be mapped across the curriculum to ensure full coverage.
image005E-safety delivery will include the safe use of mobile phones and other internet enabled device, e.g., x box, I pad, Wii, etc.

2.3 Managing Internet Access

2.3.1 Information system security
image005Virus protection will be updated regularly on all networked computers.
image005School ICT systems capacity and security will be reviewed regularly.

2.3.2 E-mail
image005Pupils may only use approved e-mail accounts on the school system.
image005Pupils must immediately tell a teacher if they receive offensive e-mail.
image005Pupils must not reveal personal details of themselves or others in e-mail communication, or arrange to meet anyone without specific permission.

2.3.3 Public Web published content and the school web site
image005The contact details on the website should be the school address, e-mail and telephone number. Staff or pupils’ personal information will not be published.
image005E-mail addresses will be published carefully, to avoid spam harvesting.
image005The Headteacher or nominee will take overall editorial responsibility and ensure that content is accurate and appropriate.
image005The website should comply with the school’s guidelines for publications, including respect for intellectual property rights and copyright.

2.3.4 Web Publishing pupils’ images and work
image005Images, published to the web, that include pupils will be selected carefully and will not enable individual pupils to be clearly identified.
image005>Pupils’ full names will not be used anywhere on the website, particularly in association with photographs.
image005Written permission from parents/carers will be obtained before images of pupils are electronically published to the web.
image005Pupil’s work can only be published to the website with the permission of the pupil and parents/carers.

2.3.5 Social networking and personal publishing
image005The City Council/school will block/filter access to social networking sites, except those specifically purposed to support educationally approved practice.
image005Newsgroups will be blocked unless a specific use is approved.
image005Staff and pupils will be advised never to give out personal details of any kind which may identify them or their location.
image005Pupils and parents/carers will be advised that the use of social network spaces, outside school based controlled systems (i.e. SCORE/ Learning Platform), is inappropriate for primary aged pupils, unless strictly supervised.
image005Staff and pupils should be advised not to publish specific and detailed private thoughts on social networking sites.

2.3.6 Managing filtering
image005The school will work with Stoke-on-Trent City Council, Becta and the WAN Managed Service Provider to ensure systems to protect pupils are reviewed and improved.
image005If staff or pupils discover an unsuitable site, the URL must be reported to the school filtering manager (nominated contact), the e‑Safety Coordinator or the WAN Managed Service Provider helpdesk.

2.3.7 Managing emerging technologies
image005Emerging technologies will be examined for educational benefit and a risk assessment will be carried out and protocols established before use in school is allowed.
image005Mobile phones will not be used during lessons or formal school time, unless specifically allowed to support learning as identified by the teacher. The sending of abusive or inappropriate text messages is forbidden.
image005Staff will use the school phone system where text or mobile contact with parents/carers is required.

2.3.8 Protecting personal data and passwords
image005Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998.
image005All pupils are allocated an individual username and password with which to access the computers, their e-mail accounts and the learning platform.
image005Key Stage 1 classes use a generic class password as this is appropriate for the age of the pupils. Any inappropriate use would be highlighted by the class teacher and/or the forensic software monitoring and this practice would be amended if deemed necessary. Children normally move on to using their own passwords in Y2.
image005Key Stage 2 pupils are told their personal usernames and passwords and encouraged to ensure these remain secret.
image005Passwords are changed if necessary to maintain security.
image005Relevant staff (I.e. class teachers) have access to relevant pupil passwords.

2.4 Policy Decisions

2.4.0 Authorising Internet access
image005The school will maintain a current record of all staff and pupils who are granted access to the school’s electronic communications, which includes internet access. The record will be kept up-to-date, for instance a member of staff may leave or a pupil’s access be withdrawn.
image005All staff must read and sign the ‘Staff Information Systems Code of Conduct’ before using any school ICT resource.
image005At Key Stage 1 access to the Internet will be by adult demonstration or by directly supervised access to specific, approved on-line materials.
image005Parents/Carers will be asked to sign and return a consent form.
image005Sanctions for inappropriate use are included in the behaviour policy. The E-Safety co-ordinator will monitor computer and internet use. Issues will be dealt with and evidence recorded and assessed by the E-Safety co-coordinator.

2.4.1 Assessing risks
image005The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the international scale and linked nature of Internet content, it is not possible to guarantee that unsuitable material will never appear on a school computer. Neither the school nor Stoke-on-Trent City Council can accept liability for the material accessed, or any consequences of Internet access.
image005The school will audit ICT provision to establish if the e-safety policy is adequate and that the implementation of the e-safety policy is appropriate.
image005The use of computer systems without permission or for inappropriate purposes could constitute a criminal offence under the Computer Misuse Act 1990.
image005Methods to identify, assess and minimise risks will be reviewed regularly.

2.4.2 Handling e-safety complaints
image005Complaints of Internet misuse will be dealt with by a senior member of staff.
image005Any complaint about staff misuse must be referred to the Headteacher.
image005Complaints of a child protection nature must be dealt with in accordance with school child protection procedures.
image005Pupils and parents/carers will be informed of the complaints procedure.
image005Parents/Carers and pupils will need to work in partnership with staff to resolve issues.
image005Sanctions within the school discipline policy will include:

  • interview/counselling by the head of key stage;
  • informing parents/carers or carers;
  • removal or restriction of Internet or computer access for a period.

2.4.3 Community use of the Internet
image005The school will liaise with local organisations to establish a common approach to e-safety.

2.4.4 Cyberbullying – Understanding and addressing the issues

While cyberbullying is likely to be low level in primary schools the age of pupils making proficient use of technology is ever decreasing. Therefore, the opportunities for pupils to bully or be bullied via technology, such as e-mail, texts or MSN, are becoming more frequent.

As such, teaching pupils about appropriate behaviours when using technology provides a vital grounding for future use. Whilst not wanting to provoke unrecognised opportunities in pupils, consideration must be given to suitable teaching and procedures to address any issues of cyberbullying.

As felt appropriate for the age and use of technology by the pupils:
image005The school’s anti-bullying policy and/or school behaviour policy will address cyberbullying. Cyberbullying will also be addressed in ICT, PHSE and other relevant lessons and is brought to life through activities. As with other whole-school policies, all staff and young people will be included and empowered to take part in the process.
image005Pupils, parents/carers, staff and governors will all be made aware of the consequences of cyberbullying. Young people and their parents/carers will be made aware of pupils’ rights and responsibilities in their use of new technologies, and what the sanctions are for misuse via the school bullying policy and the school behaviour policy.
image005Parents/Carers will be provided with an opportunity to find out more about cyberbullying through: session for parents/carers, guidance, websites published in newsletter and on the school website.

2.4.5   Cyberbullying – How will risks be assessed?
image005The school will take all reasonable precautions to ensure against cyberbullying whilst pupils are in its care. However, due to the global and connected nature of new technologies, it is not possible to guarantee that inappropriate use via a school computer will not occur. Neither the school, nor Stoke-on-Trent City Council, can accept liability for inappropriate use, or any consequences resulting outside of school.
image005The school will proactively engage with KS2 pupils in preventing cyberbullying by:

  • understanding and talking about cyberbullying, e.g. inappropriate use of e-mail, text messages;
  • keeping existing policies and practices up-to-date with new technologies;
  • ensuring easy and comfortable procedures for reporting;
  • promoting the positive use of technology;
  • evaluating the impact of prevention activities.

image005Records of any incidents of cyberbullying will be kept and will be used to help to monitor the effectiveness of the school’s prevention activities.

2.4.6         How will cyberbullying reports/issues be handled?
image005Complaints of cyberbullying will be dealt with by a senior member of staff.
image005Any complaint about staff misuse must be referred to the Headteacher.
image005Evidence of offending messages, pictures or online conversations will be kept, in order to demonstrate to others what is happening. It can be used by the school, internet service provider, mobile phone company, or the police, to investigate the cyberbullying.
image005Pupils and parents/carers will be informed of the complaints procedure.
image005Parents/Carers and pupils will need to work in partnership with staff to resolve issues.

2.5 Communications Policy

2.5.1 Introducing the e-safety policy to pupils
image005E-safety rules will be posted in all networked rooms and discussed with pupils at the start of each year and as the need arises.image005Pupils will be informed that network and Internet use will be monitored.

  • E-Safety lessons through the computing curriculum and targeted focus days raise the awareness and importance of safe and responsible internet use/use of mobile phones.
  • Instruction in responsible and safe use should precede Internet access.
  • E-Safety is referenced/covered within computing modules.

2.5.2 Staff and the E-Safety policy
image005All staff will be given the School E-Safety Policy and its application and importance explained.
image005All staff will be informed that all computer and Internet use will be monitored. Discretion and professional conduct is essential.
image005Staff training in safe and responsible Internet use and on the school e‑Safety Policy will be provided as required.
image005Staff that manage filtering systems or monitor ICT use will be supervised by senior management and have clear procedures for reporting issues.

2.5.3 Enlisting parents/carers support
image005Parents/Carers’ attention will be drawn to the School e-Safety Policy in newsletters, the school brochure, on the school website and through parents/carers awareness sessions held regularly.
image005Parents/Carers views and ideas will be canvassed by questionnaires.
image005Parents/Carers are welcome to bring any issues to staff to deal with.
image005Parents/Carers will be kept informed about e-safety teaching as is takes place each term.

Appendix 1: Internet use – Possible teaching and learning activities

 

Activities Key e-safety issues Relevant websites
Creating web directories to provide easy access to suitable websites.

 

Parental consent should be sought.

Pupils should be supervised.

Pupils should be directed to specific, approved on-line materials.

 

Web directories e.g.

Networked favourites

Ikeepbookmarks.com

SCORE minisites

 

Using search engines to access information from a range of websites.

 

Parental consent should be sought.

Pupils should be supervised.

Pupils should be taught what internet use is acceptable and what to do if they access material they are uncomfortable with.

 

Web quests e.g.

־       Ask Jeeves for kids

־       Yahooligans

־       CBBC Search

־       Kidsclick

Exchanging information with other pupils and asking questions of experts via e-mail.

 

Pupils should only use approved e-mail accounts.

Pupils should never give out personal information.

Consider using systems that provide online moderation e.g. SuperClubs.

SCORE sgfl accounts

 

School Net Global

E-mail a children’s author

E-mail Museums and Galleries

Publishing pupils’ work on school and other websites for feedback.

 

Pupil and parental consent should be sought prior to publication.

Pupils’ full names and other personal information should be omitted.

Pupils should be encouraged to report any inappropriate comments.

SCORE Showcase

Making the News

 

Podcasts

Publishing images including photographs of pupils.

 

Parental consent for publication of photographs should be sought.

Photographs should not enable individual pupils to be identified.

File names should not refer to the pupil by name.

Making the News

SuperClubs

Learninggrids

Museum sites, etc.

Digital Storytelling

BBC – Primary Art

Communicating ideas within blogs, chat rooms or online forums.

 

Only blogs/chat rooms dedicated to educational use and that are moderated should be used.

Access to other social networking sites should be blocked.

Pupils should never give out personal information.

SCORE Blogs

SuperClubs

Skype

FlashMeeting

 

VLE

Audio and video conferencing to gather information and share pupils’ work.

 

Pupils should be supervised.

Only sites that are secure and need to be accessed using an e-mail address or protected password should be used.

 

Skype

FlashMeeting

National Archives “On-Line”

Global Leap

National History Museum

Imperial War Museum

E-Safety Audit – Primary / Special

This quick self-audit will help the senior management team (SMT) assess whether the e-safety basics are in place to support a range of activities that might include those detailed within Appendix 1.

Has the school an e-Safety Policy that complies with C&YP guidance? Y/N
Date of latest update:
The Policy was agreed by governors on:
The Policy is available for staff at:
And for parents/carers at:
The Designated Child Protection Coordinator is:
The e-Safety Coordinator is:
Has e-safety training been provided for staff? Y/N
Has e-safety training been coherently planned and delivered for pupils? Y/N
Do all staff sign an ICT Code of Conduct on appointment? Y/N
Do parents/carers sign and return an agreement that their child will comply with the school e-Safety Rules? Y/N
Have school e-Safety Rules been set with pupils? Y/N
Are these Rules displayed in all rooms with computers? Y/N
Internet access is provided by an approved educational Internet service provider and complies with DCSF requirements for safe and secure access (e.g. Stoke-on-Trent Educational WAN).  

Y/N

Is personal data collected, stored and used according to the principles of the Data Protection Act? Y/N
Do all school computers have e-safety text monitoring software (Forensic) installed? Y/N
Has the school filtering policy been approved by SMT? (N/A unless school has taken over responsibility) Y/N
If the school has taken responsibility for its own webfiltering, have appropriate members of staff attended training on the filtering system and are appropriate procedures in place? Y/N
Is an ICT security audit advisable (possibly using external expertise) to ensure e-safe practice technically and educationally? Y/N

 

E-Safety Policy Version 8 Autumn 2015