Download presentation
Presentation is loading. Please wait.
Published byMelina Ramsey Modified over 8 years ago
1
e-Safe, e-Secure in a connected world? Allison Allen Director, Outstream Consulting Trustee, Naace Board of Management Naace Sponsoring Partners Networking Event 15 May 2015
2
“It’s not the technology....stupid!” May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 2
3
E-SAFETY Identifying the risk May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 3
4
The risk? Most people think of activities that put young people at risk such as grooming or paedophile activity, bullying Personal misrepresentation and use of the internet for purchasing, publishing photos and videos, social networking and chat Rarely self-harm is mentioned What else.....? May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 4
5
Identifying risk Source: George Couros via Pinterest May-15 5 Social Media Computing curriculum Now – some e-safetyin the digital literacy aspect (about10%) eg; KS2 – “use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour; identify a range of ways to report concerns about content and contact” KS4 – “understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to report a range of concerns” Computing curriculum Now – some e-safetyin the digital literacy aspect (about10%) eg; KS2 – “use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour; identify a range of ways to report concerns about content and contact” KS4 – “understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to report a range of concerns” Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
6
May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 6 “We need a pedagogy free from fear and focused on the magic of children's innate quest for information and understanding” Sugata Mitra “We need a pedagogy free from fear and focused on the magic of children's innate quest for information and understanding” Sugata Mitra
7
FRAMEWORKS & GUIDANCE Fundamental to success is that learning can take place in a safe physical or virtual space May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 7
8
Trend: Gaming e-safety? May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 8 External influences - Increased autonomy as schools become academies. Loss of LA support for e-safety - new academies reinvent the wheel. Plateau of safeguarding progression related to growth rate in number of academies in England since 2010 election. New Ofsted rules for E-Safety inspection 2014. Result - Desire of schools to ‘be seen’ to be doing the right thing – use of tools for ‘tick box’ evidence New academies’ difficulty ensuring legal /moral compliance; pupil safeguarding less than optimal with slowing progress at school level/deterioration of provision. E-Safety has become just another aspect of school administration to ‘game’ when the inspector calls. IoE/U Plymouth working paper
9
CommercialAggressiveSexualValues Content (learner as recipient) Adverts Spam Sponsorship Personal info Violent/hateful content Pornographic or unwelcome sexual content Bias Racist Misleading info or advice Contact (learner as participant) Tracking Harvesting personal info Being bullied, harassed or stalked Meeting strangers Being groomed Self-harm Unwelcome persuasions Conduct (learner as actor) Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Byron Review: e-safety and risk categorisation May-15 9 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
10
The PIES model (Policies, Infrastructure, Education and Standards) Policies and practices Standards and inspection Infrastructure and technology Education and training May-15 10 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
11
The Curriculum: Digital Literacy “Digital literacy is the ‘savvyness’ that allows young people to participate meaningfully and safely as digital technology becomes ever more pervasive in society” [Futurelab]
12
Naace Self Review Framework A structure for reviewing the school’s use of ICT and impact on school improvement in: Leadership & Management, Use of ICT in the curriculum, Teaching & Learning, Assessment of digital capability, Professional Development, Resources E-Safety and Safeguarding are evidenced throughout External validation via ICT Mark - The national benchmark award for schools with good use of technology to support teaching, learning and school administration. May-15 12 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
13
Study of the Safe Use of New Technologies (2010) All the staff shared responsibility for e-safety. Pupils in the schools that had ‘ managed ’ systems had better knowledge and understanding of how to stay safe than those in schools with ‘ locked down ’ systems. Pupils were more vulnerable when schools used locked down systems because they were not given enough opportunities to learn how to assess and manage risk for themselves. In the outstanding schools, senior leaders, governors, staff and families worked together to develop a clear strategy for e-safety. They had excellent relationships with families...continue to support e-safety at home. May-15 13 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
14
Control in a user-driven, mobile media environment? Inconsequential use -> feeling of powerlessness -> hopelessness ->greater risk [Dr. Ian Rivers, Brunel University] Agency, stakeholder, citizenship -> empowerment -> greater safety [Harvard] Citizenship suggests active, ethical engagement [Adapted from Anne Collier Co-director, ConnectSafely.org] cannibaliczombie.deviantart.com Control v agency? May-15 14 This is the Internet now 14 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
15
Digital Citizenship & e-safety ‘Norms’ May-15 15 1. Student Learning and Academic Performance 2. Student Environment and Behaviour 3. Student Life Outside School Digital Access Digital Literacy Digital Communication Digital Security & Safety Digital Law Digital Access Digital Commerce Adapted from: Digital Citizenship in Schools: Mike Ribble & Gerald Bailey Digital Rights & Responsibilities Digital Etiquette Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
16
RADICALISATION May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 16
17
A school View "Police have advised us there is no evidence radicalisation took place at the academy.... students do not have access to social media sites like Facebook and Twitter on Academy computers.” Headteacher, Bethnal Green Academy May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 17
18
Government view May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 18 Responsibility to protect children from extremist views in schools. Tougher standards to ensure that schools support fundamental British values. Bar individuals involved or linked with extremism from managing or teaching. Voluntary code of practice which will depend on schools implementing robust policies to protect children and young people from harm, including exposure to intolerant or extremist views. Counter-Terrorism and Security Act 2015 - a statutory duty on educational institutions to prevent the radicalisation of their students and staff. This Act, became law on 12 th February 2015, puts a responsibility on schools to prevent students being drawn into terrorism, and challenge extremist ideologies.
19
‘Prevent’ Strategy May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 19 Schools can support young people: providing a safe environment for discussing controversial issues and helping young people understand how they can influence and participate in decision-making. We need to recognise that, young people can be exposed to extremist influences or prejudiced views, particularly those via the internet and other social media. Schools can help to protect children from extremist and violent views in the same ways that they help to safeguard children from drugs, gang violence or alcohol.
20
Supplier view “Blocking access to the internet not only closes off the opportunity to gain access to useful learning resources, but in scenarios where radicalisation is a threat it shuts down the ability to identify vulnerable individuals. By monitoring computer and tablet usage in school, establishments can detect early warning signs and ‘at risk’ students can be identified and supported before the situation escalates.” May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 20
21
Ofsted view Technologies..... can give access to harmful and inappropriate materials and, because of the anonymity offered, vulnerable individuals may be harmed or exploited. Children who hold a parent’s hand every time they cross the road are safe. However, unless they are taught to cross the road by themselves, they might not learn to do this independently. A child whose use of the internet is closely monitored at school will not necessarily develop the level of understanding required to use new technologies responsibly in other contexts. In the best practice seen, pupils were helped, from a very early age, to assess the risk of accessing sites and therefore gradually to acquire skills which would help them adopt safe practices even when they were not supervised. May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 21
22
CEOP view “The remit of CEOP is the sexual exploitation of children. Radicalisation is a different problem that we do not deal with.” May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 22 “At this time, CEOP will not be creating materials directly relating to children being radicalised online. Our resources can/ are however being used to highlight the stages of grooming and where children can go to report and seek support.”
23
CommercialAggressiveSexualValues Content (learner as recipient) Adverts Spam Sponsorship Personal info Violent/hateful content Pornographic or unwelcome sexual content Bias Racist Misleading info or advice Contact (learner as participant) Tracking Harvesting personal info Being bullied, harassed or stalked Meeting strangers Being groomed Self-harm Unwelcome persuasions Conduct (learner as actor) Illegal downloading Hacking Gambling Financial scams Terrorism Bullying or harassing another Creating and uploading inappropriate material Providing misleading info/advice Byron Review: e-safety and risk categorisation May-15 23 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
24
Uncertainty The 3 “Teenage 'jihadi brides' were ruthlessly groomed online” “Twitter accused of allowing them to be 'brainwashed in their bedrooms” “One of the girls was 'following' more than 70 known extremists on the site” ISIS Manifesto – “Adult men to marry girls aged nine” Adapted from: Katy Potts, Islington via http://www.lgfl.net/esafety/Pages/counter-extremism.aspx
25
E-SECURITY “The industry’s interpretation of the trusted computing idea is … to find threats and to make computing trustworthier. The main difference is that you cannot decide by your own what is trustworthy, and what is not. Because they already decided for you. And they already decided not to trust you. So, if they don’t trust you, why should you trust them?” Media Influencer Blog/Adriana May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 25
26
Data Protection May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 26 360 Degree Safe surveyed 4628 schools re data privacy policies. Many still struggle to navigate the legal and moral maze. The law - potential harm to children/pupils if their data are misused or not kept private. Evidence of clear blunders by schools in legal compliance and in maintaining good practice in the storage and use of electronic data. Anything that is done to the data is ‘processing’ the data; this covers its creation or collection to its eventual destruction. IoE/U Plymouth working paper
27
Head in the Cloud or Sleepwalking? Cloud storage and productivity tools Efficiency, collaboration - free or cost Contract T&Cs, Privacy.....26 page dense legal documents ICO school survey 2014 – 54% respondents did not understand or had not read the terms, conditions and privacy policies that formed the school’s contract with the cloud supplier. Advice: http://www.ico.org.uk/ May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 27
28
“Click to accept....” the apologistic cloud supplier “If you submit redacted #content# you grant ‘REDACTED’ a non-exclusive, worldwide, perpetual, irrevocable, royalty- free license to use, modify, adapt, publish, translate, perform, make searchable, convert into another format, and create derivative works from and/or distribute your #content# for any purpose. Additionally, by posting/uploading #content#, you further grant all users of the service and anyone who obtains the #content# via an external search engine, a non-exclusive, worldwide, perpetual, irrevocable, royalty-free license to use, modify, adapt, publish, translate, perform, and create derivative works from and/or distribute your #content# for any purpose.” Content = information about pupils and/or staff May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 28 No warranty that third party/beta version (current) will be error free or that security will be secure or effective As part of providing the Services, ‘REDACTED’ may transfer, store and process Customer Data in the United States or any other country in which ‘REDACTED’ or its agents maintain facilities. By using the Services, Customer consents to this transfer, processing and storage of Customer Data.
29
FUD Proactive not reactive May-15 29 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
30
Fear, Uncertainty, Doubt 3 fold action Mechanisms to make issues visible Accountability Really good Communication May-15 30 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
31
Mechanisms, Accountability, Communication - opportunity Appoint someone to the School Information Risk Officer (SIRO) role Create a SIRO Board eSafeguarding Governor, eSafeguarding/eSafety Co, ICT Co, Business MGR, Technical Staff, DPA Lead Risk Assessment cf 8 Data Protection Principles Where is data hosted? Who has access? Data recovery? Encryption?....... May-15 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk 31
32
Fear, Uncertainty, Doubt You can’t prevent everything – but you should measure success Are the right judgement calls being made.... Irrespective of frameworks/tools etc? Who is accountable for child protection / safeguarding? Beware vested interests May-15 32 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
33
Fear, Uncertainty, Doubt E-safety = safeguarding issues amplified by technology. Adults affected as well as children but technology brings learning benefits and mitigates risk by increasing visibility of issues & supports assurance May-15 33 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
34
Fear, Uncertainty, Doubt Recognise that e-safety is not a technological issue and is not limited to settings where children have access to technology. Responsibility for e-safety must not be delegated to technical staff or ICT/Computing staff, but must be firmly embedded within safeguarding policies, practices and responsibilities. Increase clarity Involve all stakeholder groups Work with partners Include private and voluntary groups May-15 34 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
35
Fear, Uncertainty, Doubt Spotting a child protection issue Key organisations Where is the information held / who do you contact What should you do? How are we monitoring outcomes and compliance? May-15 35 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
36
“So as you think about the new and sexy technologies that your leaders want deployed in 2015, before proceeding, consider the key human behaviour and process elements required to realise success.” May-15 36 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
37
Thank you e: Allison.allen@outstream.co.ukAllison.allen@outstream.co.uk t: 0208 406 0334 www: outstream.co.uk Copy:http://tinyurl.com/esafe-esecure May-15 37 Allison Allen | Outstream Consulting | t: 0208 406 0334 m: allison.allen@outstream.co.uk
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.