LGfL supporting e-safety Helen Warner Royal Borough of Kensington and Chelsea ICT Support Service.

Slides:



Advertisements
Similar presentations
E Safety Dorothy Stringer School. E Safety E safety is normal safety the difference is the knowledge gap.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Are you being a safe and successful digital citizen? E-safety
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Keeping our Children Safe Online
Cyber bullying and internet safety Parents meeting: staying safe online.
Mr Nigel Sinclair (Teacher of ICT)
This week is anti-bullying week.
1 CYBER BULLYING. 2 Cyberbullying Definition “…the use of information and communication technologies, particularly mobile phones and the internet, deliberately.
e-safety and cyber bullying
LGfL supporting e-safety 23 rd November 2007 Penny Patterson.
ICT Curriculum Evening – an introduction to Wizkid.
Information for Students and Families
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Internet Safety Mrs Bhayat How Much Do You Know?.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
ICT E-SAFETY ARCHIBALD FIRST SCHOOL. ICT Mark Only the 2 nd school in Newcastle LA to achieve the award: October 2009 Only the 2 nd school in Newcastle.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
Bullying in Bromley: The views of Bromley’s children and young people Michael Watts Senior Partnerships and Planning Officer London Borough of Bromley.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
E-Safety features. E-safety on DB Primary : An overview Through DB Primary your children are able to experience the communication tools available on the.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
E-safety for Parents Why? Schools have a major role to play in developing pupils’ understanding of how to use new technologies safely. However, pupils.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Tim Reid Malvern Parish C.E Primary School Internet Safety.
© Childnet International 2008 What are the risks?.
SafetyNet4 Training Ian Gover
 “Nicknames” are preferred when posting something about a student on a web page. It is never a good idea to use a students’ real name.  Always get written.
Acceptable Use Policy==Safe and responsible users.
LGfL supporting e-safety Penny Patterson.
You must be an E-safety Support member to use these resources in your school. © www.e-safetysupport.com Cyber Bullying.
Helping your family to stay in control Living with technology.
Digital Citizenship Unit 1 Review True/Not True. The agreement that’s students and parent’s sign that describes the school district’s online policy is.
Madison Petro Jenelle Richards Mat Lucas. Bullying is when somebody mistreats another person on purpose. The people being bullied most likely has a hard.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
IT & e-Safety Paul Leverett Lead Teacher of ICT 25 th September 2013.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Staying Safe in Cyberspace Tregolls School-An Academy.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Online Safety ~ Raising students’ awareness of the risks of Internet use ~
Special Project Cyber bullying Issues By: Abby Heim.
Welcome to Archbishop Temple School PTA Forum Keeping your child safe online Gill Jackson Headteacher Paul Cairns Director of New Technologies.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
E-Safety Parent Talk Helping to keep your children safe online.
What is Smoothwall? Department of Children’s Services.
Understanding Centralian Senior College’s Position on Bullying within our School Bullying.
Keeping Safe Online A Guide for Parents. Quality & Improvement Service nyASSIST Data for children in the Craven area % of Year 6 pupils have their.
E-Safety Presentation Chollerton C. of E. Aided First School How to reduce risks for your child whilst using the internet. Chollerton C. of E. Aided First.
E-Safety.
Keeping our Children Safe on the internet
Sharing Images – The Law
Cyber-bullying.
Working to Keep our Children Safe in a World Filled with Technology
Online Filtering, Monitoring and Safe Practice
Digital Learning in Portree Primary School
E-Learning Consultant SCC
Unit 1 Review True/Not True
Online Safety! Created by Educational Technology Network
Cyber-bullying.

Individual ( and secure) PUPIL PROFILES
Presentation transcript:

LGfL supporting e-safety Helen Warner Royal Borough of Kensington and Chelsea ICT Support Service

A class of 9 year olds are in the ICT suite. The teacher gives them a research topic ‘Thailand’. Salil calls the teacher over to tell her that the search results include a link ‘adult sex’, he is told “Don’t click the link” and the teacher then moves away to talk to another group of children elsewhere in the classroom.

Darren, a young Australian teacher, has his own MySpace area and has posted pictures of himself, his friends and lots of details of his life. There’s a video clip of him in Lanzarotte, very drunk, having fun. Some of his pupils have found it.

A very high number of pupils have their own MSN Messenger accounts and brag about how many ‘friends’ they have. You overhear one of the particularly brash Y9 girls bragging about her ‘older boyfriend’, who she plans to meet.

Education Programme

Penelope, Head of Maths, has ed some pupil reports to her hotmail account so she can finish at home.

Alan, a science teacher, has been using his open Blog to share his views about education, his school and the school’s leadership.

A teacher tells her technician she is upset because a pupil has posted a rude message on a Forum in the London MLE and asks him which child it was because she doesn’t know.

Policy Resources Policy separated into sections and includes specific references for child protection and anti-bullying policies

Acceptable Use Policies

Mr Jones reports that a student has a pornographic image on his screen. The student says the “image just appeared and it’s the first time it’s happened”.

A 14 year old boy has taken his own life. There is an allegation of bullying and that the pupil had used websites that openly support suicide.

LGfL URL filtering Based around the NetSweeper filtering system Provides 4 levels of filtering Blocks all illegal content on the Internet Watch Foundation blacklist –Global Deny list - contains other URLs deemed to be entirely unsuitable for access within LGfL network –Category database - categorises URLs and blocks by category –Local Deny list - allows blocking of individual URLs –Local Allow list - allows access to an otherwise blocked URL

LGfL monitoring reports URL logging Every request made through the URL filtering service is logged, including: –Date and time –IP address of the user –URL details –Category of the URL –Whether it was blocked or allowed All logs are kept for a minimum of 3 months and are fully searchable Logs are stored unprocessed, for forensic purposes Forensic software also available – contact Synetrix

NetSweeper Reporter Wizard

John, the technician finds evidence of a member of support staff gaining access to some pornographic videos. He tells the Deputy, Keith, who says, which computer? “Lets have a look”. Keith takes a look and agrees. They suspect its Danny, who’s part-time and wait until he’s in to challenge him. He denies all knowledge and then accuses the Deputy of harassing him. Danny has never signed an Acceptable Use Policy form.

1. Inform Head / senior leader and start an incident log. All staff must report back to the member of SMT who updates the incident log at each stage. 2. Don’t use the equipment. Photograph, bag and secure it – witness by 2 people from SMT. Suspend user’s network / computer access. 3. SMT decide if sufficient initial evidence / doubt to suspend member of staff pending investigation. Possible incident procedure in case of illegal content

4. Link computer name to IP address on LAN. If auditing enabled on server, link username to computer. Request Internet logs from Synetrix. SMT inform LA – eSafety officer (Personnel) etc. Gather evidence e.g. screen prints if have Forensic software, AUP form, CCTV footage, timetable, etc. 5. SMT decide whether to involve a Third Party Forensic firm. Start disciplinary action if necessary. In case of Child Pornography – immediately inform Police at: Possible incident procedure in case of illegal content cont: