8

Page 1

E- Safety and Cyber-bullying E-safety encompasses internet technologies & electronic communications e.g. mobile phones, computers, gaming consoles and wireless technology. It highlights the need to educate children, young people, their parents and staff about the benefits and risks of using this technology and provides safeguards & awareness for users to safely control their online experiences. The E-Safety policy for a setting will operate in conjunction with other policies including those for Pupil Behaviour, Bullying, Curriculum, Data Protection and Security. E-safety depends on effective practice at a number of levels:

Useful web links/resources:

Responsible ICT use by all staff, pupils and their parents

Sound implementation of E-Safety policy in both administration & curriculum, including secure network design and use

Safe and secure broadband from the Yorkshire and Humberside Grid for Learning

National Education Network standards and specifications

The purpose of internet use in educational settings is to raise educational standards, promote achievement, support the professional work of staff & enhance the settings’ management information and administration systems. Settings are expected to facilitate parental engagement via Managed Learning Environments.

Version 5, September 2010

Child Exploitation & Online Protection Centre at: www.ceop.gov.uk/ Becta at: http://publications.becta.org.uk/display.cfm?res ID=25934&page=1835

Childline - Bullying at: www.childline.org.uk/Pages/Home.aspx?gclid= CImR44CU36QCFYY14wodMhEu6A

DirectGov – Cyber-bullying at: http://yp.direct.gov.uk/cyberbullying/

Kidscape at: www.kidscape.org.uk/childrenteens/cyberbullyi ng.shtml

Beyond the E-Safety Net, DfES 2009 at: http://nationalstrategies.standards.dcsf.gov.uk/ node/178361

www.safeguardingsheffieldchildren.org.uk


What is cyber-bullying? Cyber-bullying can leave children and young people feeling scared, upset and very vulnerable, particularly as they can be victimised in their own home. There are a number of different methods of cyber-bullying, but the main ones are: • Sending emails and other messages to individuals or groups that are threatening, upsetting or offensive and may include racism, sexism, or homophobic content • Sending emails and other messages to friends of the victim to try to make them become part of the bullying • Profiles can be set up on social networking sites to make fun of a child or young person, and if others contribute to the profiles they may become part of the bullying • Mobile phones can be used for sending humiliating and abusive phone calls, texts, photos or video messages, e.g. some children or young people have shared inappropriate images of themselves and others, as well as videos of physical attacks on others

Assessing and managing risk - the setting should: • Take reasonable precautions to prevent access to inappropriate material • Maintain an audit of ICT use • Make students aware of strategies for safe use of ICT including social networks & email • Staff should safety check all sites and links before using with pupils • Access to social networking sites/newsgroups should be carefully controlled within the setting • Images of students and other identifying information should be carefully managed & in all cases parental consent should be obtained • Video conferencing should be appropriately supervised • ‘Managed’ or ‘Virtual Learning Environments’ (MLE/VLE’s) must be thoroughly risk assessed and monitored • A clear reporting process should be in place to deal with problems and all staff and students made aware of it

• Children and young people involved in interactive gaming can chat online with other players, and cyber-bullies can abuse other players, use threats, lock victims out of games, spread false rumours

• Ensure that your ‘Acceptable Use’ and ‘Esafety’ policies cover all aspects of etechnology, including ‘Managed and Virtual Learning Environments’ (MLE/VLE’s)

• Some young people are able to send viruses or hacking programs that can destroy the victim’s computer or delete personal information from their hard drive

Communicating with Pupils, staff & parents: • Rules for Internet access should be posted in all networked rooms

• Some victims of cyber-bullying have seen their personal information such as photos, emails or blogs posted where others could see them without their permission

• Pupils, staff and parents should:

Related documents on this website: • Mobile phone use by pupils, Sept 10 • Photographs, Videos and other images, Sept 10

Version 5, September 2010

o Have a thorough understanding and (where necessary) an age-appropriate copy of your’ E-Safety’ and ‘Acceptable Use’ policies o Be informed that all internet use will be monitored and traced to the individual user, and therefore appropriate conduct is essential • Attention should be drawn to the ‘E-safety’ policy in newsletters, brochures and on websites for the educational setting www.safeguardingsheffieldchildren.org.uk


Assessing risks and problems – what to do Experience of child: Universal

Vulnerable/Complex

Acute

Has a range of IT skills and understands how the internet works and it’s global audience

Some IT skills but doesn’t really understand how the internet works

Uses the internet carelessly, visiting unregulated sites

Safely enjoys the benefits of the internet and is able to communicate safely with friends and family

Visits illegal sites or sites designed for adults and develops an interest which may lead to criminal or exploitative actions

Visits adult sites and views explicitly sexual or violent material

Is the victim or perpetrator of occasional low level cyber-bullying

Exposes friends to risk by disclosing details to strangers

Maintains personal security when using chat rooms, gaming etc

Has IT skills but using them to access unsuitable areas of the internet

Posts explicitly sexual material including photos/video of self or others

Does not disclose personal details of friends to unknown parties

Uses the internet to establish contact with unknown others and discloses contact details

Discloses stranger abuse resulting from internet contact

Transmits pictures/video of self or others which could be used by internet predator or for cyber bullying

Family aware of use and understand safe use principles

Child shares interest with parents

Discloses address and phone details

Is the victim or perpetrator of sustained and/or serious cyber-bullying that includes disclosure of personal and identifying information

Agrees to meet stranger alone

Agrees to meet stranger with peer

Action from practitioners: •

Child is benefiting from parental guidance and curriculum activity

Parents and school provide advice • and consider steps which need to be taken

Continue discussion about e-safety in curriculum

Access control needed

Inform CPLT/O

Discuss with CPLT/O in school

Notify police

Consider action plan

Inform parents if safe to do so

Notify other parents if appropriate

Seek advice from Safeguarding Children Advisory Service

NB: ‘sites’ include gaming, social networking and video hosting sites If you’ve got concerns about a child you’re working with, call the:

Safeguarding Children Advisory Service Mon-Fri, 9-5pm, tel 205 3535 Version 5, September 2010

www.safeguardingsheffieldchildren.org.uk


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.