E-Safe, e-Secure in a connected world? Allison Allen Director, Outstream Consulting Trustee, Naace Board of Management Naace Sponsoring Partners Networking.

Slides:



Advertisements
Similar presentations
+ Promoting the Positive - Responding to the Negative.
Advertisements

SAFE AND WELL Angela McKinnon Feb What is Safe and Well? A document building on previous guidance - part of the SE reform programme Supplement.
Child Safeguarding Standards
Child-friendly Terms of Use: Empowering children through social media Veronica Donoso 2 December, ICT coalition forum, Brussels.
Fostering in the Digital Age. Young people and the online world Increasingly young people make very little distinction between their lives online and.
The role of the NYSCB. a)to coordinate what is done by each person or body represented on the Board for the purposes of safeguarding and promoting the.
1/15 E-Safety in Initial Teacher Training Secondary Phase.
Destinations What do you aim to achieve through the publication of destination measures? We have made it very clear that we want to put more information.
1/15 E-Safety in Initial Teacher Training Early Years and Primary Phase 25/02/10 Primaryaq.ppt.
E-safety resources Lucinda Searle Senior ICT Adviser Ian Gover Education Technology Adviser E-Safety Live 09 SWGfL.
Date of Presentation Guidelines for Industry on Child Online Protection © UNICEF/NYHQ /OLIVIER ASSELIN.
Online safety and inspection David Brown Friday 3 July 2015 Child Internet Safety summit.
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
Cambridgeshire Local Safeguarding Children Board (LSCB) and Schools in Cambridgeshire Josie Collier – LSCB Business Manager Sally.
Evaluating the impact of careers guidance for continuous improvement
A Governor Update The New Ofsted Inspection Framework DEVELOPING EXCELLENCE TOGETHER 1.
1 School Inspection Update Key Changes since January 2014 Updates continued 17 June 2014 Name Farzana Aldridge – Strategic Director & Caroline Lansdown.
Safeguarding children in a digital world Embedding an e-safety culture.
Citizenship & RE Tim Pinto Associate Lecturer Sheffield Hallam University.
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
APAPDC National Safe Schools Framework Project. Aim of the project To assist schools with no or limited systemic support to align their policies, programs.
1 School Inspection Update Key Changes since January 2014 …continued 17 June 2014 Name Farzana Aldridge – Strategic Director Caroline Lansdown – Senior.
Level 2 Safeguarding Training for Schools 2015 /16 Inspecting safeguarding, Ofsted 2015.
Why E-Safety? A summary of the reasons for teaching e-safety to adults and young people. Phil Hardcastle RSC Advisor.
What makes a successful digital citizen? Allison Allen Director, Outstream Consulting Trustee, Naace Board of Management Towards tomorrow's successful.
Safeguarding Update for Schools Autumn Term 2015 Jo Barclay Safeguarding Adviser to Schools Standards & Excellence Service.
Safeguarding Update for Schools Summer Term 2015 Jo Barclay Safeguarding Adviser to Schools Standards & Excellence Service.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Safeguarding - LINK GOVERNOR. Safeguarding – Why Section 175 requires school governing bodies, local education authorities and further education institutions.
Radicalisation in Cumbria
The new Ofsted inspection framework and implications for PSHE education The new common inspection framework for… Maintained schools and academies Further.
The Prevent Duty and its implications for schools leaders.
The New Ofsted Framework Pupil Achievement Quality of Leadership and Management Quality of Teaching Behaviour and Safety.
1/15 E-Safety in Initial Teacher Training Early Years and Primary Phase 25/02/10 Primaryaq.ppt.
Safeguarding and fundamental British Values in the School Inspection Handbook Prevent Education Leaders Conference: Luton 5 November 2015 Andrew Cook Regional.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
Keeping Children Safer Online. What is e-Safety? e-Safety = keeping our children safe online e-Safety = not about restricting and blocking but helping.
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
Provider Briefing Welcome
E-safety Lucinda Searle Senior ICT Adviser e-Learning and Information Management Service E-Safety Live 09 SWGfL.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Raising Awareness in Sheffield Schools Autumn/Winter
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Chestnuts Primary School PREVENT Protecting our children and families from Extremism & Radicalisation Wednesday 27 th April 2015.
MEETING THE PREVENT DUTY 2015 Razia Butt Reslience Adviser.
Selina Stewart Lead associate: Prevent duty Further Education and Sixth Form Colleges Seminar.
What is the Prevent Duty? Part of the 2015 Counter Terrorism and Security Act. A duty to protect ‘people from being drawn into terrorism’ by “extremists.”
3-MINUTE READ THE PREVENT DUTY. What is it and what does it mean for me? This 3-Minute Read summarises the DfE’s document: ‘The Prevent duty: Departmental.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
6 th July 2015 Jane Mackenzie E-Safety Awareness Training.
Child Safe Standards How effective is your leadership team in promoting a child safe culture in your organisation? 2 June 2016.
Solihull online safety toolkit Online safety for parents and carers [Schoolname] [Date] Details.
Supporting Vulnerable Children: Preventing Violent Behaviour and Violent Extremism.
Radicalisation in Cumbria
Online Safety and Safeguarding and prevention of liability
Online Safety and Safeguarding Update
How well do you know your school
Clerks’ Briefing Spring 2016.
Living with technology Helping you and your family to stay in control
E-Safety Briefing
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
Prevent.
E-safety – for teachers
The online safety toolkit for Wales.
E-Learning Consultant SCC
TOWER HAMLETS GUIDANCE
The East Riding Agreed Syllabus for Religious Education 2016
New Headteachers Safeguarding Briefing 2018
Presentation transcript:

e-Safe, e-Secure in a connected world? Allison Allen Director, Outstream Consulting Trustee, Naace Board of Management Naace Sponsoring Partners Networking Event 15 May 2015

“It’s not the technology....stupid!” May-15 Allison Allen | Outstream Consulting | t: m: 2

E-SAFETY Identifying the risk May-15 Allison Allen | Outstream Consulting | t: m: 3

The risk?  Most people think of activities that put young people at risk such as grooming or paedophile activity, bullying  Personal misrepresentation and use of the internet for purchasing, publishing photos and videos, social networking and chat  Rarely self-harm is mentioned  What else.....? May-15 Allison Allen | Outstream Consulting | t: m: 4

Identifying risk Source: George Couros via Pinterest May-15 5 Social Media Computing curriculum Now – some e-safetyin the digital literacy aspect (about10%) eg; KS2 – “use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour; identify a range of ways to report concerns about content and contact” KS4 – “understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to report a range of concerns” Computing curriculum Now – some e-safetyin the digital literacy aspect (about10%) eg; KS2 – “use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour; identify a range of ways to report concerns about content and contact” KS4 – “understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to report a range of concerns” Allison Allen | Outstream Consulting | t: m:

May-15 Allison Allen | Outstream Consulting | t: m: 6 “We need a pedagogy free from fear and focused on the magic of children's innate quest for information and understanding” Sugata Mitra “We need a pedagogy free from fear and focused on the magic of children's innate quest for information and understanding” Sugata Mitra

FRAMEWORKS & GUIDANCE Fundamental to success is that learning can take place in a safe physical or virtual space May-15 Allison Allen | Outstream Consulting | t: m: 7

Trend: Gaming e-safety? May-15 Allison Allen | Outstream Consulting | t: m: 8 External influences -  Increased autonomy as schools become academies.  Loss of LA support for e-safety - new academies reinvent the wheel.  Plateau of safeguarding progression related to growth rate in number of academies in England since 2010 election.  New Ofsted rules for E-Safety inspection Result -  Desire of schools to ‘be seen’ to be doing the right thing – use of tools for ‘tick box’ evidence  New academies’ difficulty ensuring legal /moral compliance; pupil safeguarding less than optimal with slowing progress at school level/deterioration of provision.  E-Safety has become just another aspect of school administration to ‘game’ when the inspector calls. IoE/U Plymouth working paper

CommercialAggressiveSexualValues Content (learner as recipient) Adverts Spam Sponsorship Personal info Violent/hateful content Pornographic or unwelcome sexual content Bias Racist Misleading info or advice Contact (learner as participant) Tracking Harvesting personal info Being bullied, harassed or stalked Meeting strangers Being groomed Self-harm Unwelcome persuasions Conduct (learner as actor) Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Byron Review: e-safety and risk categorisation May-15 9 Allison Allen | Outstream Consulting | t: m:

The PIES model (Policies, Infrastructure, Education and Standards) Policies and practices Standards and inspection Infrastructure and technology Education and training May Allison Allen | Outstream Consulting | t: m:

The Curriculum: Digital Literacy “Digital literacy is the ‘savvyness’ that allows young people to participate meaningfully and safely as digital technology becomes ever more pervasive in society” [Futurelab]

Naace Self Review Framework  A structure for reviewing the school’s use of ICT and impact on school improvement in: Leadership & Management, Use of ICT in the curriculum, Teaching & Learning, Assessment of digital capability, Professional Development, Resources  E-Safety and Safeguarding are evidenced throughout  External validation via ICT Mark - The national benchmark award for schools with good use of technology to support teaching, learning and school administration. May Allison Allen | Outstream Consulting | t: m:

Study of the Safe Use of New Technologies (2010)  All the staff shared responsibility for e-safety.  Pupils in the schools that had ‘ managed ’ systems had better knowledge and understanding of how to stay safe than those in schools with ‘ locked down ’ systems.  Pupils were more vulnerable when schools used locked down systems because they were not given enough opportunities to learn how to assess and manage risk for themselves.  In the outstanding schools, senior leaders, governors, staff and families worked together to develop a clear strategy for e-safety.  They had excellent relationships with families...continue to support e-safety at home. May Allison Allen | Outstream Consulting | t: m:

 Control in a user-driven, mobile media environment?  Inconsequential use -> feeling of powerlessness -> hopelessness ->greater risk [Dr. Ian Rivers, Brunel University]  Agency, stakeholder, citizenship -> empowerment -> greater safety [Harvard]  Citizenship suggests active, ethical engagement [Adapted from Anne Collier Co-director, ConnectSafely.org] cannibaliczombie.deviantart.com Control v agency? May This is the Internet now 14 Allison Allen | Outstream Consulting | t: m:

Digital Citizenship & e-safety ‘Norms’ May Student Learning and Academic Performance 2. Student Environment and Behaviour 3. Student Life Outside School Digital Access Digital Literacy Digital Communication Digital Security & Safety Digital Law Digital Access Digital Commerce Adapted from: Digital Citizenship in Schools: Mike Ribble & Gerald Bailey Digital Rights & Responsibilities Digital Etiquette Allison Allen | Outstream Consulting | t: m:

RADICALISATION May-15 Allison Allen | Outstream Consulting | t: m: 16

A school View "Police have advised us there is no evidence radicalisation took place at the academy.... students do not have access to social media sites like Facebook and Twitter on Academy computers.” Headteacher, Bethnal Green Academy May-15 Allison Allen | Outstream Consulting | t: m: 17

Government view May-15 Allison Allen | Outstream Consulting | t: m: 18  Responsibility to protect children from extremist views in schools.  Tougher standards to ensure that schools support fundamental British values. Bar individuals involved or linked with extremism from managing or teaching.  Voluntary code of practice which will depend on schools implementing robust policies to protect children and young people from harm, including exposure to intolerant or extremist views.  Counter-Terrorism and Security Act a statutory duty on educational institutions to prevent the radicalisation of their students and staff. This Act, became law on 12 th February 2015, puts a responsibility on schools to prevent students being drawn into terrorism, and challenge extremist ideologies.

‘Prevent’ Strategy May-15 Allison Allen | Outstream Consulting | t: m: 19 Schools can support young people: providing a safe environment for discussing controversial issues and helping young people understand how they can influence and participate in decision-making. We need to recognise that, young people can be exposed to extremist influences or prejudiced views, particularly those via the internet and other social media. Schools can help to protect children from extremist and violent views in the same ways that they help to safeguard children from drugs, gang violence or alcohol.

Supplier view “Blocking access to the internet not only closes off the opportunity to gain access to useful learning resources, but in scenarios where radicalisation is a threat it shuts down the ability to identify vulnerable individuals. By monitoring computer and tablet usage in school, establishments can detect early warning signs and ‘at risk’ students can be identified and supported before the situation escalates.” May-15 Allison Allen | Outstream Consulting | t: m: 20

Ofsted view  Technologies..... can give access to harmful and inappropriate materials and, because of the anonymity offered, vulnerable individuals may be harmed or exploited.  Children who hold a parent’s hand every time they cross the road are safe. However, unless they are taught to cross the road by themselves, they might not learn to do this independently. A child whose use of the internet is closely monitored at school will not necessarily develop the level of understanding required to use new technologies responsibly in other contexts.  In the best practice seen, pupils were helped, from a very early age, to assess the risk of accessing sites and therefore gradually to acquire skills which would help them adopt safe practices even when they were not supervised. May-15 Allison Allen | Outstream Consulting | t: m: 21

CEOP view “The remit of CEOP is the sexual exploitation of children. Radicalisation is a different problem that we do not deal with.” May-15 Allison Allen | Outstream Consulting | t: m: 22 “At this time, CEOP will not be creating materials directly relating to children being radicalised online. Our resources can/ are however being used to highlight the stages of grooming and where children can go to report and seek support.”

CommercialAggressiveSexualValues Content (learner as recipient) Adverts Spam Sponsorship Personal info Violent/hateful content Pornographic or unwelcome sexual content Bias Racist Misleading info or advice Contact (learner as participant) Tracking Harvesting personal info Being bullied, harassed or stalked Meeting strangers Being groomed Self-harm Unwelcome persuasions Conduct (learner as actor) Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Byron Review: e-safety and risk categorisation May Allison Allen | Outstream Consulting | t: m:

Uncertainty  The 3 “Teenage 'jihadi brides' were ruthlessly groomed online”  “Twitter accused of allowing them to be 'brainwashed in their bedrooms”  “One of the girls was 'following' more than 70 known extremists on the site”  ISIS Manifesto – “Adult men to marry girls aged nine” Adapted from: Katy Potts, Islington via

E-SECURITY “The industry’s interpretation of the trusted computing idea is … to find threats and to make computing trustworthier. The main difference is that you cannot decide by your own what is trustworthy, and what is not. Because they already decided for you. And they already decided not to trust you. So, if they don’t trust you, why should you trust them?” Media Influencer Blog/Adriana May-15 Allison Allen | Outstream Consulting | t: m: 25

Data Protection May-15 Allison Allen | Outstream Consulting | t: m: 26  360 Degree Safe surveyed 4628 schools re data privacy policies.  Many still struggle to navigate the legal and moral maze.  The law - potential harm to children/pupils if their data are misused or not kept private.  Evidence of clear blunders by schools in legal compliance and in maintaining good practice in the storage and use of electronic data.  Anything that is done to the data is ‘processing’ the data; this covers its creation or collection to its eventual destruction. IoE/U Plymouth working paper

Head in the Cloud or Sleepwalking?  Cloud storage and productivity tools  Efficiency, collaboration - free or cost  Contract T&Cs, Privacy page dense legal documents  ICO school survey 2014 –  54% respondents did not understand or had not read the terms, conditions and privacy policies that formed the school’s contract with the cloud supplier.  Advice: May-15 Allison Allen | Outstream Consulting | t: m: 27

“Click to accept....” the apologistic cloud supplier “If you submit redacted #content# you grant ‘REDACTED’ a non-exclusive, worldwide, perpetual, irrevocable, royalty- free license to use, modify, adapt, publish, translate, perform, make searchable, convert into another format, and create derivative works from and/or distribute your #content# for any purpose. Additionally, by posting/uploading #content#, you further grant all users of the service and anyone who obtains the #content# via an external search engine, a non-exclusive, worldwide, perpetual, irrevocable, royalty-free license to use, modify, adapt, publish, translate, perform, and create derivative works from and/or distribute your #content# for any purpose.” Content = information about pupils and/or staff May-15 Allison Allen | Outstream Consulting | t: m: 28 No warranty that third party/beta version (current) will be error free or that security will be secure or effective As part of providing the Services, ‘REDACTED’ may transfer, store and process Customer Data in the United States or any other country in which ‘REDACTED’ or its agents maintain facilities. By using the Services, Customer consents to this transfer, processing and storage of Customer Data.

FUD Proactive not reactive May Allison Allen | Outstream Consulting | t: m:

Fear, Uncertainty, Doubt 3 fold action  Mechanisms to make issues visible  Accountability  Really good Communication May Allison Allen | Outstream Consulting | t: m:

Mechanisms, Accountability, Communication - opportunity  Appoint someone to the School Information Risk Officer (SIRO) role  Create a SIRO Board  eSafeguarding Governor, eSafeguarding/eSafety Co, ICT Co, Business MGR, Technical Staff, DPA Lead  Risk Assessment cf 8 Data Protection Principles  Where is data hosted? Who has access? Data recovery? Encryption? May-15 Allison Allen | Outstream Consulting | t: m: 31

Fear, Uncertainty, Doubt  You can’t prevent everything – but you should measure success  Are the right judgement calls being made....  Irrespective of frameworks/tools etc?  Who is accountable for child protection / safeguarding?  Beware vested interests May Allison Allen | Outstream Consulting | t: m:

Fear, Uncertainty, Doubt  E-safety = safeguarding issues amplified by technology.  Adults affected as well as children but  technology brings learning benefits and  mitigates risk by increasing visibility of issues & supports assurance May Allison Allen | Outstream Consulting | t: m:

Fear, Uncertainty, Doubt  Recognise that e-safety is not a technological issue and is not limited to settings where children have access to technology.  Responsibility for e-safety must not be delegated to technical staff or ICT/Computing staff, but must be firmly embedded within safeguarding policies, practices and responsibilities.  Increase clarity  Involve all stakeholder groups  Work with partners  Include private and voluntary groups May Allison Allen | Outstream Consulting | t: m:

Fear, Uncertainty, Doubt  Spotting a child protection issue  Key organisations  Where is the information held / who do you contact  What should you do?  How are we monitoring outcomes and compliance? May Allison Allen | Outstream Consulting | t: m:

“So as you think about the new and sexy technologies that your leaders want deployed in 2015, before proceeding, consider the key human behaviour and process elements required to realise success.” May Allison Allen | Outstream Consulting | t: m:

Thank you e: t: www: outstream.co.uk Copy: May Allison Allen | Outstream Consulting | t: m: