E- Safety and Cyber-bullying E-safety encompasses internet technologies & electronic communications e.g. mobile phones, computers, gaming consoles and wireless technology. It highlights the need to educate children, young people, their parents and staff about the benefits and risks of using this technology and provides safeguards & awareness for users to safely control their online experiences. The E-Safety policy for a setting will operate in conjunction with other policies including those for Pupil Behaviour, Bullying, Curriculum, Data Protection and Security. E-safety depends on effective practice at a number of levels:
Useful web links/resources:
Responsible ICT use by all staff, pupils and their parents
Sound implementation of E-Safety policy in both administration & curriculum, including secure network design and use
Safe and secure broadband from the Yorkshire and Humberside Grid for Learning
National Education Network standards and specifications
The purpose of internet use in educational settings is to raise educational standards, promote achievement, support the professional work of staff & enhance the settings’ management information and administration systems. Settings are expected to facilitate parental engagement via Managed Learning Environments.
Version 5, September 2010
Child Exploitation & Online Protection Centre at: www.ceop.gov.uk/ Becta at: http://publications.becta.org.uk/display.cfm?res ID=25934&page=1835
Childline - Bullying at: www.childline.org.uk/Pages/Home.aspx?gclid= CImR44CU36QCFYY14wodMhEu6A
DirectGov – Cyber-bullying at: http://yp.direct.gov.uk/cyberbullying/
Kidscape at: www.kidscape.org.uk/childrenteens/cyberbullyi ng.shtml
Beyond the E-Safety Net, DfES 2009 at: http://nationalstrategies.standards.dcsf.gov.uk/ node/178361
www.safeguardingsheffieldchildren.org.uk
What is cyber-bullying? Cyber-bullying can leave children and young people feeling scared, upset and very vulnerable, particularly as they can be victimised in their own home. There are a number of different methods of cyber-bullying, but the main ones are: • Sending emails and other messages to individuals or groups that are threatening, upsetting or offensive and may include racism, sexism, or homophobic content • Sending emails and other messages to friends of the victim to try to make them become part of the bullying • Profiles can be set up on social networking sites to make fun of a child or young person, and if others contribute to the profiles they may become part of the bullying • Mobile phones can be used for sending humiliating and abusive phone calls, texts, photos or video messages, e.g. some children or young people have shared inappropriate images of themselves and others, as well as videos of physical attacks on others
Assessing and managing risk - the setting should: • Take reasonable precautions to prevent access to inappropriate material • Maintain an audit of ICT use • Make students aware of strategies for safe use of ICT including social networks & email • Staff should safety check all sites and links before using with pupils • Access to social networking sites/newsgroups should be carefully controlled within the setting • Images of students and other identifying information should be carefully managed & in all cases parental consent should be obtained • Video conferencing should be appropriately supervised • ‘Managed’ or ‘Virtual Learning Environments’ (MLE/VLE’s) must be thoroughly risk assessed and monitored • A clear reporting process should be in place to deal with problems and all staff and students made aware of it
• Children and young people involved in interactive gaming can chat online with other players, and cyber-bullies can abuse other players, use threats, lock victims out of games, spread false rumours
• Ensure that your ‘Acceptable Use’ and ‘Esafety’ policies cover all aspects of etechnology, including ‘Managed and Virtual Learning Environments’ (MLE/VLE’s)
• Some young people are able to send viruses or hacking programs that can destroy the victim’s computer or delete personal information from their hard drive
Communicating with Pupils, staff & parents: • Rules for Internet access should be posted in all networked rooms
• Some victims of cyber-bullying have seen their personal information such as photos, emails or blogs posted where others could see them without their permission
• Pupils, staff and parents should:
Related documents on this website: • Mobile phone use by pupils, Sept 10 • Photographs, Videos and other images, Sept 10
Version 5, September 2010
o Have a thorough understanding and (where necessary) an age-appropriate copy of your’ E-Safety’ and ‘Acceptable Use’ policies o Be informed that all internet use will be monitored and traced to the individual user, and therefore appropriate conduct is essential • Attention should be drawn to the ‘E-safety’ policy in newsletters, brochures and on websites for the educational setting www.safeguardingsheffieldchildren.org.uk
Assessing risks and problems – what to do Experience of child: Universal
Vulnerable/Complex
Acute
•
Has a range of IT skills and understands how the internet works and it’s global audience
•
Some IT skills but doesn’t really understand how the internet works
•
•
Uses the internet carelessly, visiting unregulated sites
Safely enjoys the benefits of the internet and is able to communicate safely with friends and family
•
Visits illegal sites or sites designed for adults and develops an interest which may lead to criminal or exploitative actions
Visits adult sites and views explicitly sexual or violent material
•
•
Is the victim or perpetrator of occasional low level cyber-bullying
Exposes friends to risk by disclosing details to strangers
•
•
•
Maintains personal security when using chat rooms, gaming etc
Has IT skills but using them to access unsuitable areas of the internet
Posts explicitly sexual material including photos/video of self or others
•
Does not disclose personal details of friends to unknown parties
•
Uses the internet to establish contact with unknown others and discloses contact details
•
Discloses stranger abuse resulting from internet contact
•
•
Transmits pictures/video of self or others which could be used by internet predator or for cyber bullying
•
Family aware of use and understand safe use principles
•
Child shares interest with parents
•
Discloses address and phone details
Is the victim or perpetrator of sustained and/or serious cyber-bullying that includes disclosure of personal and identifying information
•
Agrees to meet stranger alone
•
•
Agrees to meet stranger with peer
Action from practitioners: •
Child is benefiting from parental guidance and curriculum activity
•
Parents and school provide advice • and consider steps which need to be taken
•
Continue discussion about e-safety in curriculum
•
Access control needed
•
Inform CPLT/O
•
Discuss with CPLT/O in school
•
Notify police
•
Consider action plan
•
Inform parents if safe to do so
•
Notify other parents if appropriate
Seek advice from Safeguarding Children Advisory Service
NB: ‘sites’ include gaming, social networking and video hosting sites If you’ve got concerns about a child you’re working with, call the:
Safeguarding Children Advisory Service Mon-Fri, 9-5pm, tel 205 3535 Version 5, September 2010
www.safeguardingsheffieldchildren.org.uk