SlideShare una empresa de Scribd logo
1 de 18
Keeping Children Safe
The curriculum e-Safety solution for Schools and Parents
Contents
• Children’s access to online content and social apps
• How the curriculum and Ofsted are attempting to deal with this
• Schools’ purchases of tablet devices going forward
• Keeping children safe on those devices, in school and beyond
• How Point2Protect can help
The whole world in their hands…
…but how do we
(a) keep them safe and
(b) help them become
sophisticated users of these
powerful communication
tools?
A growing problem?
“Young people should be able to enjoy technology and social media
without feeling under threat. Providers need to make it as easy to
prohibit harmful messages or images as it is to share them.” NSPCC
“The problem of 'sexting' - and the exposure of children to
pornographic images through mobile devices - poses real and serious
challenges for parents, head teachers and school staff. It exemplifies
the way technology blurs the boundaries between school life and the
wider world.“ National Association of Head Teachers
So let’s just block it at source!
• David Cameron said in July 2013 he would force the big four ISP’s to
enable parents to block access to dangerous content
• The percentage of customers taking up the option for each service
provider are as follows*:
• Virgin Media - 4%
• BT - 5%
• Sky - 8%
• TalkTalk - 36%
*Ofcom July 2014
A child quoted in the Byron Review 2008
“Kids don’t need protection - we
need guidance. If you protect us
you are making us weaker. We
won’t go through all the trial and
error necessary to learn what we
need to survive on our
own…don’t fight our battles for
us, just give us assistance when
we need it.”
e-Safety in the curriculum
• Only in 2009, after the Byron Review (2008) and Lord Laming’s Review
(2009), does e-Safety start to appear in the KS3 and KS4 curriculum
• Ofsted begin to consider e-Safety provision in inspections
• Computing Programmes of Study for Sept 2014 include e-Safety from
KS1 through to KS4
• This suggests that e-Safety should now be a taught subject in primary
and secondary schools
• But non-maintained schools aren’t required to adopt this
Computing Programmes of Study 2014
• Key Stage 1 - use technology safely and respectfully, keeping personal information private;
identify where to go for help and support when they have concerns about content or contact on
the internet or other online technologies.
• Key Stage 2 - use technology safely, respectfully and responsibly; recognise
acceptable/unacceptable behaviour; identify a range of ways to report concerns about content
and contact.
• Key Stage 3 - understand a range of ways to use technology safely, respectfully, responsibly and
securely, including protecting their online identity and privacy; recognise inappropriate content,
contact and conduct and know how to report concerns.
• Key Stage 4 - understand how changes in technology affect safety, including new ways to protect
their online privacy and identity, and how to identify and report a range of concerns.
Ofsted inspection criteria
• School should offer (among other things):
• All teaching and non-teaching staff receive regular
and up-to-date training
• An age-appropriate e-safety curriculum teaching
pupils how to stay safe and take responsibility for
their own and others’ safety. Uses positive rewards
and peer mentoring programmes
• Recognised Internet Service Provider (ISP) or Regional
Broadband Consortium (RBC) together with age-
related filtering that is actively monitored
Devices, devices, devices…
• By 2020 schools expect tablets
to make up over 50% of their ICT
hardware*
• iOS and Android are the most
popular tablet options
• Smartphones in schools mainly
Android with fewer iPhones
*BESA research 2014
Mobile phones - Daily Mail September 2008
“Academics* are calling on schools to rethink
bans on phone handsets after trials suggested
that functions such as calculators, stopwatches
and email can be 'educational'.
However, the call is certain to infuriate many
teachers and parents, who will be concerned
that pupils will be unable to resist the
temptation to put the devices to less productive
uses, such as cyber-bullying or cheating in tests.”
The Daily Mail view
*University of Nottingham study for BECTA
Smartphone dangers
• Almost 1 in 5 children say they have seen something on their phone
that has upset them
• Over 20% of parents admit they aren’t really aware of what their
children do online
• While 90% of parents claim to have spoken to their children about
online dangers, most allow unsupervised access to the internet
BBC Learning Poll 2013
• “A common misconception that smartphones and tablets don’t need
the same level of protection as a PC.”
Kaspersky Labs 2014
Typical e-Safety in schools 2014
• Increasing spend on tablet computers with little idea how they’re
being used in school and no idea out of school
• Most schools ban the use of pupils’ mobile phones on their premises
• School network web-filtering used to block, stop and defend
• Teachers often have an single annual e-Safety CPD course
• Very little formal e-Safety teaching for pupils
• Parents aren’t engaged apart from agreeing an Acceptable Use Policy
(AUP) that they probably don’t even read properly
Two key areas to be addressed
• Security
• Filtering for mobile devices in
school, on and off domain
• Schools should be able to control
app-usage on tablets and phones,
on and off domain
• School-owned devices should be
protected whether in school or at
home
• BYOD needs to be included in this
secure environment
• e-Safety
• New AUPs are required with
proper buy-in from parents and
pupils
• Schools need to understand how
tablets are being used, on and off
domain
• Understanding needs to lead to
engagement with pupils
• Parents need to be given the
option to join the party
Point2Protect – a new service for schools
• Qustodio for Schools
• Filtering and app scheduling by
profile on tablets and smart
phones, on and off domain
• Summary reporting on devices by
group (i.e. year 7 tablets) or detail
on any single device
• Provides understanding without
intrusive detail (i.e. doesn’t read
text messages, etc.)
• UK Safer Internet Centre
• Templates for new AUP for schools
• Templates for communication to
the school community
• Guidance for SMT and Governors
on e-Safety
• Guidance for teachers on
understanding and engaging with
pupils
• Guidance for parents that schools
can pass on
Point2Protect - the parent link
• Schools can give parents full
access to their children’s data
• Parents can choose to extend
security and scheduling across
all devices at home, creating
their own usage profile
• UK SIC guidance specifically
aimed at parental engagement
with children

Más contenido relacionado

La actualidad más candente

Smartphones in the classroom
Smartphones in the classroomSmartphones in the classroom
Smartphones in the classroomMarion Stamps
 
Smartphones in Education
Smartphones in EducationSmartphones in Education
Smartphones in Educationjbry2
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGAllan Lloyd Martinez
 
Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safelyDan Bowen
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Educationsspengler
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsntropi
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Reji Mae Sunot
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010shirleyclubb
 

La actualidad más candente (20)

Smartphones in the classroom
Smartphones in the classroomSmartphones in the classroom
Smartphones in the classroom
 
Smartphones in Education
Smartphones in EducationSmartphones in Education
Smartphones in Education
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
 
Secondary and special good practice - innovating safely
Secondary and special good practice - innovating safelySecondary and special good practice - innovating safely
Secondary and special good practice - innovating safely
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
internetsafety
internetsafetyinternetsafety
internetsafety
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Edtech
EdtechEdtech
Edtech
 
Ict maria h
Ict maria hIct maria h
Ict maria h
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
The Future of Technology and Education
The Future of Technology and EducationThe Future of Technology and Education
The Future of Technology and Education
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology funds
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010
 

Destacado (9)

156_berde-berdea.ppt
156_berde-berdea.ppt156_berde-berdea.ppt
156_berde-berdea.ppt
 
Editoriales
EditorialesEditoriales
Editoriales
 
Herramientas de la web 2.0
Herramientas de la web 2.0Herramientas de la web 2.0
Herramientas de la web 2.0
 
1. escuchar | 2. enlazar | 3. compartir
1. escuchar | 2. enlazar | 3. compartir1. escuchar | 2. enlazar | 3. compartir
1. escuchar | 2. enlazar | 3. compartir
 
7principios ramirez
7principios ramirez7principios ramirez
7principios ramirez
 
Sare sozialak eta segurtasuna
Sare sozialak eta segurtasunaSare sozialak eta segurtasuna
Sare sozialak eta segurtasuna
 
Tratu txarrak
Tratu txarrakTratu txarrak
Tratu txarrak
 
Calculadora de dominio público colombiana
Calculadora de dominio público colombianaCalculadora de dominio público colombiana
Calculadora de dominio público colombiana
 
Relatoria7 tallone-dr
Relatoria7 tallone-drRelatoria7 tallone-dr
Relatoria7 tallone-dr
 

Similar a Point2Protect - keeping children safe

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Prof Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptxProf Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptxJumairaSharief
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2guest594ea
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02carrietales
 
1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and GuidelinesMaria Mead
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policyMatt Britland
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014Rebecca Avery
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Mobile devices in the classroom
Mobile devices in the classroomMobile devices in the classroom
Mobile devices in the classroommrsadam
 

Similar a Point2Protect - keeping children safe (20)

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Prof Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptxProf Ed 10- Lesson 5.pptx
Prof Ed 10- Lesson 5.pptx
 
Ofsted & E Safety Show Dormat
Ofsted & E Safety Show DormatOfsted & E Safety Show Dormat
Ofsted & E Safety Show Dormat
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02
 
1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policy
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Mobile devices in the classroom
Mobile devices in the classroomMobile devices in the classroom
Mobile devices in the classroom
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Último (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Point2Protect - keeping children safe

  • 1. Keeping Children Safe The curriculum e-Safety solution for Schools and Parents
  • 2. Contents • Children’s access to online content and social apps • How the curriculum and Ofsted are attempting to deal with this • Schools’ purchases of tablet devices going forward • Keeping children safe on those devices, in school and beyond • How Point2Protect can help
  • 3. The whole world in their hands… …but how do we (a) keep them safe and (b) help them become sophisticated users of these powerful communication tools?
  • 4. A growing problem? “Young people should be able to enjoy technology and social media without feeling under threat. Providers need to make it as easy to prohibit harmful messages or images as it is to share them.” NSPCC “The problem of 'sexting' - and the exposure of children to pornographic images through mobile devices - poses real and serious challenges for parents, head teachers and school staff. It exemplifies the way technology blurs the boundaries between school life and the wider world.“ National Association of Head Teachers
  • 5. So let’s just block it at source! • David Cameron said in July 2013 he would force the big four ISP’s to enable parents to block access to dangerous content • The percentage of customers taking up the option for each service provider are as follows*: • Virgin Media - 4% • BT - 5% • Sky - 8% • TalkTalk - 36% *Ofcom July 2014
  • 6. A child quoted in the Byron Review 2008 “Kids don’t need protection - we need guidance. If you protect us you are making us weaker. We won’t go through all the trial and error necessary to learn what we need to survive on our own…don’t fight our battles for us, just give us assistance when we need it.”
  • 7. e-Safety in the curriculum • Only in 2009, after the Byron Review (2008) and Lord Laming’s Review (2009), does e-Safety start to appear in the KS3 and KS4 curriculum • Ofsted begin to consider e-Safety provision in inspections • Computing Programmes of Study for Sept 2014 include e-Safety from KS1 through to KS4 • This suggests that e-Safety should now be a taught subject in primary and secondary schools • But non-maintained schools aren’t required to adopt this
  • 8. Computing Programmes of Study 2014 • Key Stage 1 - use technology safely and respectfully, keeping personal information private; identify where to go for help and support when they have concerns about content or contact on the internet or other online technologies. • Key Stage 2 - use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour; identify a range of ways to report concerns about content and contact. • Key Stage 3 - understand a range of ways to use technology safely, respectfully, responsibly and securely, including protecting their online identity and privacy; recognise inappropriate content, contact and conduct and know how to report concerns. • Key Stage 4 - understand how changes in technology affect safety, including new ways to protect their online privacy and identity, and how to identify and report a range of concerns.
  • 9. Ofsted inspection criteria • School should offer (among other things): • All teaching and non-teaching staff receive regular and up-to-date training • An age-appropriate e-safety curriculum teaching pupils how to stay safe and take responsibility for their own and others’ safety. Uses positive rewards and peer mentoring programmes • Recognised Internet Service Provider (ISP) or Regional Broadband Consortium (RBC) together with age- related filtering that is actively monitored
  • 10. Devices, devices, devices… • By 2020 schools expect tablets to make up over 50% of their ICT hardware* • iOS and Android are the most popular tablet options • Smartphones in schools mainly Android with fewer iPhones *BESA research 2014
  • 11.
  • 12.
  • 13. Mobile phones - Daily Mail September 2008 “Academics* are calling on schools to rethink bans on phone handsets after trials suggested that functions such as calculators, stopwatches and email can be 'educational'. However, the call is certain to infuriate many teachers and parents, who will be concerned that pupils will be unable to resist the temptation to put the devices to less productive uses, such as cyber-bullying or cheating in tests.” The Daily Mail view *University of Nottingham study for BECTA
  • 14. Smartphone dangers • Almost 1 in 5 children say they have seen something on their phone that has upset them • Over 20% of parents admit they aren’t really aware of what their children do online • While 90% of parents claim to have spoken to their children about online dangers, most allow unsupervised access to the internet BBC Learning Poll 2013 • “A common misconception that smartphones and tablets don’t need the same level of protection as a PC.” Kaspersky Labs 2014
  • 15. Typical e-Safety in schools 2014 • Increasing spend on tablet computers with little idea how they’re being used in school and no idea out of school • Most schools ban the use of pupils’ mobile phones on their premises • School network web-filtering used to block, stop and defend • Teachers often have an single annual e-Safety CPD course • Very little formal e-Safety teaching for pupils • Parents aren’t engaged apart from agreeing an Acceptable Use Policy (AUP) that they probably don’t even read properly
  • 16. Two key areas to be addressed • Security • Filtering for mobile devices in school, on and off domain • Schools should be able to control app-usage on tablets and phones, on and off domain • School-owned devices should be protected whether in school or at home • BYOD needs to be included in this secure environment • e-Safety • New AUPs are required with proper buy-in from parents and pupils • Schools need to understand how tablets are being used, on and off domain • Understanding needs to lead to engagement with pupils • Parents need to be given the option to join the party
  • 17. Point2Protect – a new service for schools • Qustodio for Schools • Filtering and app scheduling by profile on tablets and smart phones, on and off domain • Summary reporting on devices by group (i.e. year 7 tablets) or detail on any single device • Provides understanding without intrusive detail (i.e. doesn’t read text messages, etc.) • UK Safer Internet Centre • Templates for new AUP for schools • Templates for communication to the school community • Guidance for SMT and Governors on e-Safety • Guidance for teachers on understanding and engaging with pupils • Guidance for parents that schools can pass on
  • 18. Point2Protect - the parent link • Schools can give parents full access to their children’s data • Parents can choose to extend security and scheduling across all devices at home, creating their own usage profile • UK SIC guidance specifically aimed at parental engagement with children

Notas del editor

  1. Smartphones in primary years 5 and 6 now not uncommon. 90% of secondary students expected to bring a mobile phone to school.
  2. The dilemma is often ‘how do we keep children safe while helping them become more mature, sophisticated users of these devices?’ There’s a recognition that you can’t, like King Canute, command the waves of questionable online content to recede. It’s out there and children will be exposed to it, so what do we do?
  3. This quote encapsulates the issue quite clearly. Prof. Tanya Byron gave an analogy about teaching a child to cross the road. We know it’s dangerous and we know that at some point they’ll have to do it alone. So what’s the process and when do we trust them to cross without us holding their hand?
  4. Only very recently has e-Safety been included in the National Curriculum and nothing’s gone as far as the new 2014 requirements.
  5. It’s clear from the programmes of study how pupils are expected to develop their judgement and responsibility through the key stages, but how exactly do we expect this to happen? Surely it suggests that e-Safety should be a taught subject and that schools need a clear strategy for encouraging this progression.
  6. Clearly e-Safety is important enough for Ofsted to inspect performance and it’s an essential signal of an outstanding school. However, there’s no evidence that Ofsted are aware of the issues generated by the fastest growing technology in schools today – mobile computing.
  7. Interesting that many schools still ban the use of mobile phones but they’re giving pupils tablet computers as quickly as they can afford to. They clear see one as a problem and the other as a benefit, but in fact they’re almost identical in functionality.
  8. By security here they may be talking about the fear of having them stolen rather than children’s security, but management is also part of the equation.
  9. This is interesting. Primary schools in particular want to own the devices themselves and even secondary schools would rather own themselves than have parents pay. Leasing schemes still have a bad name in schools.
  10. No surprise about the line that the Daily Mail takes on this. It’s interesting that this is two years before the first iPads were released and the world went tablet-crazy. However, although tablets are changing the technology landscape in schools the attitude to smartphones hasn’t changed at all. Even when proof is produced via research that mobile phones are a cost-effective and available educational tool for schools, the fear of losing control keeps them unused.
  11. This is my characterisation based on discussions with teachers and the available research.
  12. One important thing to remember: once Q4S is installed on a device it will keep working when they take that device home. There may be legal issues with the reporting aspect of this, but the majority of parents would surely welcome that fact that their children wouldn’t be able to access pornography, or drug web sites, or extreme violence, on those devices. Having a basic filtering profile in place 24/7 on these devices has got to be a good thing, for both schools and parents.
  13. The ideal is a really good relationship between the school and the parent, with both understanding and accepting their responsibilities for protecting and educating the child, and both having access to the tools and information they need to achieve this.