SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Chad Vale Primary E-Safety Policy Draft 1.2
                             (formerly known as ICT Protection Policy)


1. Introduction
E-Safety Co-ordinator: Paul Sansom (DHT and ICT Co-ordinator)
Designated Senior Person for Child Protection: Robin Haselgrove (Head Teacher)

1.1 Why the Internet and digital communications are important

The Internet is an essential element in 21st century life for education, business and social
interaction. The school has a duty to provide pupils with quality Internet access as part of
their learning experience. Internet use is a part of the statutory curriculum and a
necessary tool for staff and pupils.

1.2 Internet use will enhance learning

The school Internet access will be designed expressly for pupil use and will include
filtering appropriate to the age of pupils. This includes the use of:

     BGfL Firewall
   
     Webwasher Central Filtering system
   
     Policy Central monitoring software
   
     The ability to block/limit internet access to users/areas through Viglen Remote
   
     Learning
    BGfL Filtered Webmail system for pupils and staff
    Sophos Enterprise Manager Virus Protection

Pupils will be taught what Internet use is acceptable and what is not and given clear
objectives for Internet use through the Acceptable Use Policy (AUP). Before logging into
any workstation within school, all users must click to accept the AUP.

Pupils will be educated in the effective use of the Internet in research, including the skills
of knowledge location, retrieval and evaluation. Pupils will be shown how to publish and
present information to a wider audience and how to evaluate Internet content.

The school will ensure that the use of Internet derived materials by staff and pupils
complies with copyright law.

Pupils will be taught the importance of cross-checking information before accepting its
accuracy and how to report unpleasant Internet content e.g. using the CEOP Report
Abuse icon or Hector Protector.


2. Managing Internet Access
2.1 Information system security
     School ICT systems security will be reviewed regularly following guidance
        contained in the E-Security, Data Management and Protection Policy (Feb ’09)
        and in light of any new guidance issued by the LA, government or Becta.
     Virus protection will be updated regularly through automatic updates of Sophos
AV.
       Passwords and network/MIS/school email user names will be kept safe and
   
       secure.

2.2 E-mail
     Pupils may only use approved BGfL e-mail accounts on the school system which is
       safe, secure and monitored/filtered.
     Staff are issued with BGfL Webmail accounts, but may access personal mail
       accounts if required during break times or before/after school.
     Pupils must immediately tell a teacher if they receive offensive e-mail.
     In e-mail communication, pupils must not reveal their personal details or those of
       others, or arrange to meet anyone without specific permission.
     Incoming e-mail should be treated as suspicious and attachments not opened
       unless the author is known.
     The forwarding of chain letters is not permitted.
     Staff must not share personal email addresses with pupils but may share their BGfL
       Webmail account where appropriate.

2.3 Published content and the school web site
     Staff or pupil personal contact information will not be published.
     The E-Safety Co-ordinator will take overall editorial responsibility and ensure that
       content is accurate and appropriate.

2.4 Publishing pupil’s images and work
     Parents sign an authorisation form when their child begins Chad Vale, giving
       permission for images of their child (or their work) to be used on the website and
       on other publications e.g. weekly newsletter. Where this permission is not granted,
       photos/work are never used.
     Photographs that include pupils will be selected appropriately to avoid images
       being misused. Although pupils may be recognised, photos used on the website
       are low-quality, and if required, edited to prevent children without photographic
       consent to be identified.
     Pupils names will not be used anywhere on the school website or other on-line
       space in association with photographs or video, unless express permission has
       been granted by parents/carers.
     Special written permission from parents or carers will be obtained before images
       of pupils are published anywhere other than the school website (e.g. local
       newspapers, outside agencies, CVTV)

2.5 Social networking and personal publishing (e.g. blogging)
     The LA currently controls access to social networking sites and they are not
       available through the BGfL at present. The facility to unblock Social Networking
       sites for individual schools exists, and may this facility may be explored in the
       future.
     Pupils are advised never to give out personal details of any kind which may
       identify them, their friends or their location.
     Pupils and parents will be advised that the use of social network spaces outside
       school brings a range of dangers for primary aged pupils.
     Pupils will be advised to use nicknames and avatars when using social networking
       sites.
     Annual Parents E-Safety ‘Seminars’ will be offered to all parents concerned about
       the issues of internet use within school and at home.
3. Managing filtering
       If staff or pupils come across unsuitable on-line materials, the site must be reported
   
       to the E-Safety Coordinator. Sites can be referred to the BGfL team for global
       blocking if required, or local blocking can be performed on-site through Policy
       Central or Viglen Classlink.
       Policy Central logs will be monitored by the DSP and E-Safety Co-ordinator.
   


4. Managing videoconferencing & webcam use
       Video-conferencing will use the educational broadband network to ensure
   
       quality of service and security.
       Pupils must ask permission from the supervising teacher before making or
   
       answering a videoconference call.
      Video-conferencing and webcam use will be appropriately supervised for the
       pupils age.

5. Managing emerging technologies
       Emerging technologies will be examined for educational benefit and a risk
   
       assessment will be carried out before use in school is allowed.
       Mobile phones with wireless Internet access can bypass school filtering systems
   
       and present a new route to undesirable material and communications. Pupils at
       Chad Vale are not permitted to have mobile phones in school (and in
       emergency circumstances where they do need to be in contact with
       parents/carers before or after school, pupil phones are held securely in the school
       safe during the school day.
       Games machines including the Sony Playstation, Microsoft Xbox and others may
   
       have games that are age-inappropriate. Care is required in any use in school and
       must be supervised by staff.
       The appropriate use of Learning Platforms will be discussed as the technology
   
       becomes available within the school.

5.1 Staff Use of personal Mobile Phones/cameras
     Staff may be required to take personal mobile phones on trips. These must not be
        used to capture images of pupils, and ideally, should not be used to make
        contact with parents or pupils. Emergency calls, where necessary should go
        through the school office.

       School digital cameras are provided. Where personal digital cameras are used in
   
       school, images should be downloaded in school, and memory cards formatted
       before and after use. Where possible, school-owned memory cards should be
       used in personal cameras and must be used solely for school purposes.

5.2 Protecting personal data
     Personal data will be recorded, processed, transferred and made available
       according to the Data Protection Act 1998 (see E-Security, Data Management
       and Protection Policy: Feb 2009)

6. Policy Decisions
6.1 Authorising Internet access
     The school will maintain a current record of all staff and pupils who are granted
       access to school ICT systems through Policy Central software.
All staff must read and sign the Staff AUP before using any school ICT resource.
   
       At Key Stage 1, access to the Internet will be by adult demonstration with
   
       supervised access to specific, approved on-line materials.
      Parents will be asked to sign the AUP for their child to use the internet as part of
       the induction process. Children are asked to counter-sign the AUP after discussion
       with parents/carers.
       Any person not directly employed by the school will be asked to accept the AUP
   
       before being allowed to access the internet from the school site.
       All users of the school computer system understand that the systems in place
   
       afford no privacy.

6.2 Assessing risks
     The school will take all reasonable precautions to prevent access to inappropriate
       material. However, due to the international scale and linked nature of Internet
       content, it is not possible to guarantee that unsuitable material will never appear
       on a computer connected to the school network. Neither the school nor
       Birmingham LA can accept liability for any material accessed, or any
       consequences of Internet access.

      The school will audit ICT use on a regular basis to establish if the e-safety policy is
       adequate and that the implementation of the e-safety policy is appropriate and
       effective through informal/formal monitoring and the use of Policy Central.

6.3 Handling e-safety complaints
     Complaints of Internet misuse will be dealt with by a senior member of staff.
     Any complaint about staff misuse must be referred to the Head Teacher.
     Complaints of a child protection nature must be dealt with in accordance with
       school and LA Child Protection Procedures.
     If a serious breach of the AUP is discovered, the monitor of the PC in question
       should be turned off and the computer put ‘out of order’. This is to prevent the
       contamination of evidence that may be collected by outside agencies (e.g.
       police) if required.
     Pupils and parents will be informed of consequences for pupils misusing the
       Internet.

6.4 Community use of the Internet
     Any use of the school system by visitors will be bound by the terms and conditions
      in the AUP and will be monitored by the systems in place for pupils and staff.

7. Communications Policy
7.1 Introducing the e-safety policy to pupils
     Pupils will be informed that network and Internet use will be monitored and
        appropriately followed up.
     E-Safety rules will be posted in all rooms where computers are used and discussed
        with pupils regularly.
     E-Safety training will be embedded within the ICT scheme of work and the
        Personal Social and Health Education (PSHE) curriculum.

7.2 Staff and the e-Safety policy
     All staff will be given the School e-Safety Policy and its importance explained.
     Staff are informed that network and Internet traffic is monitored and traced to the
individual user and that there should be no expectation of privacy when using
       any school ICT equipment (including laptops used off-site).
       Senior staff manage filtering systems and monitor ICT use in collaboration with the
   
       DSP and Headteacher.
      Staff will always use the ‘safe search’ facilities within search engines when
       accessing the web with pupils and must check all search terms before use with
       pupils.
       Any staff member with an online identity’ (e.g. in social networking sites) will
   
       ensure that access to this information is kept private and not shared with pupils at
       Chad Vale Primary School.

7.3 Enlisting parents’ and carers’ support
     Chad Vale Primary School’s E-Safety Policy will be shared with parents and carers
        in the school newsletter, prospectus and school web site.
     Parents with any concerns about E-Safety are encouraged to contact the school
        for further guidance and support.
     Parents sign the Parent’s Consent Form on an annual basis after sharing our age
        appropriate safety rules with their child (see appendix)
Chad Vale Primary School
                               e-Safety Rules
All pupils use computer facilities including Internet access as an
essential part of learning, as required by the National Curriculum.
Both pupils and their parents/carers are asked to sign to show that
the e-Safety Rules have been understood and agreed.


Pupil:                                           Class:

Pupil’s Agreement
   • I have read and I understand the school e-Safety Rules.
   • I will use the computer, network, internet and other new technologies
         in a responsible way at all times.
   • I know that network and Internet access is monitored.
Signed:                                          Date:


Parent’s Consent for Web Publication of Work and Photographs/Video
I agree that my son/daughter’s work may be electronically published. I also
agree that appropriate images and video that include my son/daughter
may be published subject to the school rule that images will not be
accompanied by pupil names.

Parent’s Consent for Internet Access
I have read and understood the school e-safety rules and give permission for
my son/daughter to access the Internet. I understand that the school will
take all reasonable precautions to ensure that pupils cannot access
inappropriate materials but I appreciate that this is a difficult task.
I understand that the school cannot be held responsible for the content of
materials accessed through the Internet. I agree that the school is not liable
for any damages arising from use of the Internet facilities.


Signed:                                          Date:

Please print name:

                  Please complete, sign and return to Mr. Sansom
Key Stage 1 and EYFS Safety Rules




Key Stage 2 (Y3 and 4) Safety Rules
Key Stage 2 (Y5 and 6) Safety Rules




                       E-Safety Rules (Y5/6)
These e-Safety Rules help to protect pupils and the school by describing acceptable
computer use.

  • We follow the rules set by the school for the computer network and internet
    access.

  • We understand that irresponsible use may result in the loss of our network or
    internet access.

  • We access the computers using our own account and password, which must
    not be given to any other person.

  • We use the school network and Internet appropriately.

  • We do not copy other people’s work (text, music, images) without permission.

  • We write messages carefully and politely.

  • We don’t send anonymous messages or chain letters.

  • We keep our personal information private when using email, personal publishing,
    blogs or messaging.

  • We understand that our use of computers in school is monitored at all times.

Más contenido relacionado

La actualidad más candente

Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for homeEmma Watts
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_throughEmma Watts
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3bweinert
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]ajdredla
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Byod for djh students final
Byod for djh students finalByod for djh students final
Byod for djh students finalSue Miller
 

La actualidad más candente (19)

Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Tahunanui cluster walk_through
Tahunanui cluster walk_throughTahunanui cluster walk_through
Tahunanui cluster walk_through
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Mobile devices summer 2013
Mobile devices summer  2013Mobile devices summer  2013
Mobile devices summer 2013
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haigh
 
E safety training
E safety trainingE safety training
E safety training
 
Izrael
IzraelIzrael
Izrael
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Byod for djh students final
Byod for djh students finalByod for djh students final
Byod for djh students final
 

Similar a E Safety Policy Mar 09 Draft 1.2

Security
SecuritySecurity
SecurityNabatah
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ssLenva Shearing
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaupmclardy
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingTuPham99
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJovenLopez1
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 

Similar a E Safety Policy Mar 09 Draft 1.2 (20)

Aup
AupAup
Aup
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Security
SecuritySecurity
Security
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Digital citizenship ss
Digital citizenship ssDigital citizenship ss
Digital citizenship ss
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaup
 
CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade Reading
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
AUP
AUPAUP
AUP
 
E safety inset
E safety insetE safety inset
E safety inset
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Ofsted & E Safety Show Dormat
Ofsted & E Safety Show DormatOfsted & E Safety Show Dormat
Ofsted & E Safety Show Dormat
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 

Más de guest594ea

Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2guest594ea
 
ICT Mark Summary Action Plan Section 2 Curriculum
ICT Mark Summary Action Plan Section 2 CurriculumICT Mark Summary Action Plan Section 2 Curriculum
ICT Mark Summary Action Plan Section 2 Curriculumguest594ea
 
St George's Easiteach Inset 1
St George's Easiteach Inset 1St George's Easiteach Inset 1
St George's Easiteach Inset 1guest594ea
 
Section 5 Action Plan Professional Development
Section 5 Action Plan Professional DevelopmentSection 5 Action Plan Professional Development
Section 5 Action Plan Professional Developmentguest594ea
 
ICT Policy Chad Vale 2009
ICT Policy Chad Vale 2009ICT Policy Chad Vale 2009
ICT Policy Chad Vale 2009guest594ea
 
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09guest594ea
 
Blog Keynote For Web
Blog Keynote For WebBlog Keynote For Web
Blog Keynote For Webguest594ea
 

Más de guest594ea (8)

Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2
 
130 783
130 783130 783
130 783
 
ICT Mark Summary Action Plan Section 2 Curriculum
ICT Mark Summary Action Plan Section 2 CurriculumICT Mark Summary Action Plan Section 2 Curriculum
ICT Mark Summary Action Plan Section 2 Curriculum
 
St George's Easiteach Inset 1
St George's Easiteach Inset 1St George's Easiteach Inset 1
St George's Easiteach Inset 1
 
Section 5 Action Plan Professional Development
Section 5 Action Plan Professional DevelopmentSection 5 Action Plan Professional Development
Section 5 Action Plan Professional Development
 
ICT Policy Chad Vale 2009
ICT Policy Chad Vale 2009ICT Policy Chad Vale 2009
ICT Policy Chad Vale 2009
 
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09
Chad Vale Ict Development Plan 2005 8 Reviewed Feb 09
 
Blog Keynote For Web
Blog Keynote For WebBlog Keynote For Web
Blog Keynote For Web
 

Último

Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Último (20)

Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

E Safety Policy Mar 09 Draft 1.2

  • 1. Chad Vale Primary E-Safety Policy Draft 1.2 (formerly known as ICT Protection Policy) 1. Introduction E-Safety Co-ordinator: Paul Sansom (DHT and ICT Co-ordinator) Designated Senior Person for Child Protection: Robin Haselgrove (Head Teacher) 1.1 Why the Internet and digital communications are important The Internet is an essential element in 21st century life for education, business and social interaction. The school has a duty to provide pupils with quality Internet access as part of their learning experience. Internet use is a part of the statutory curriculum and a necessary tool for staff and pupils. 1.2 Internet use will enhance learning The school Internet access will be designed expressly for pupil use and will include filtering appropriate to the age of pupils. This includes the use of: BGfL Firewall  Webwasher Central Filtering system  Policy Central monitoring software  The ability to block/limit internet access to users/areas through Viglen Remote  Learning  BGfL Filtered Webmail system for pupils and staff  Sophos Enterprise Manager Virus Protection Pupils will be taught what Internet use is acceptable and what is not and given clear objectives for Internet use through the Acceptable Use Policy (AUP). Before logging into any workstation within school, all users must click to accept the AUP. Pupils will be educated in the effective use of the Internet in research, including the skills of knowledge location, retrieval and evaluation. Pupils will be shown how to publish and present information to a wider audience and how to evaluate Internet content. The school will ensure that the use of Internet derived materials by staff and pupils complies with copyright law. Pupils will be taught the importance of cross-checking information before accepting its accuracy and how to report unpleasant Internet content e.g. using the CEOP Report Abuse icon or Hector Protector. 2. Managing Internet Access 2.1 Information system security  School ICT systems security will be reviewed regularly following guidance contained in the E-Security, Data Management and Protection Policy (Feb ’09) and in light of any new guidance issued by the LA, government or Becta.  Virus protection will be updated regularly through automatic updates of Sophos
  • 2. AV. Passwords and network/MIS/school email user names will be kept safe and  secure. 2.2 E-mail  Pupils may only use approved BGfL e-mail accounts on the school system which is safe, secure and monitored/filtered.  Staff are issued with BGfL Webmail accounts, but may access personal mail accounts if required during break times or before/after school.  Pupils must immediately tell a teacher if they receive offensive e-mail.  In e-mail communication, pupils must not reveal their personal details or those of others, or arrange to meet anyone without specific permission.  Incoming e-mail should be treated as suspicious and attachments not opened unless the author is known.  The forwarding of chain letters is not permitted.  Staff must not share personal email addresses with pupils but may share their BGfL Webmail account where appropriate. 2.3 Published content and the school web site  Staff or pupil personal contact information will not be published.  The E-Safety Co-ordinator will take overall editorial responsibility and ensure that content is accurate and appropriate. 2.4 Publishing pupil’s images and work  Parents sign an authorisation form when their child begins Chad Vale, giving permission for images of their child (or their work) to be used on the website and on other publications e.g. weekly newsletter. Where this permission is not granted, photos/work are never used.  Photographs that include pupils will be selected appropriately to avoid images being misused. Although pupils may be recognised, photos used on the website are low-quality, and if required, edited to prevent children without photographic consent to be identified.  Pupils names will not be used anywhere on the school website or other on-line space in association with photographs or video, unless express permission has been granted by parents/carers.  Special written permission from parents or carers will be obtained before images of pupils are published anywhere other than the school website (e.g. local newspapers, outside agencies, CVTV) 2.5 Social networking and personal publishing (e.g. blogging)  The LA currently controls access to social networking sites and they are not available through the BGfL at present. The facility to unblock Social Networking sites for individual schools exists, and may this facility may be explored in the future.  Pupils are advised never to give out personal details of any kind which may identify them, their friends or their location.  Pupils and parents will be advised that the use of social network spaces outside school brings a range of dangers for primary aged pupils.  Pupils will be advised to use nicknames and avatars when using social networking sites.  Annual Parents E-Safety ‘Seminars’ will be offered to all parents concerned about the issues of internet use within school and at home.
  • 3. 3. Managing filtering If staff or pupils come across unsuitable on-line materials, the site must be reported  to the E-Safety Coordinator. Sites can be referred to the BGfL team for global blocking if required, or local blocking can be performed on-site through Policy Central or Viglen Classlink. Policy Central logs will be monitored by the DSP and E-Safety Co-ordinator.  4. Managing videoconferencing & webcam use Video-conferencing will use the educational broadband network to ensure  quality of service and security. Pupils must ask permission from the supervising teacher before making or  answering a videoconference call.  Video-conferencing and webcam use will be appropriately supervised for the pupils age. 5. Managing emerging technologies Emerging technologies will be examined for educational benefit and a risk  assessment will be carried out before use in school is allowed. Mobile phones with wireless Internet access can bypass school filtering systems  and present a new route to undesirable material and communications. Pupils at Chad Vale are not permitted to have mobile phones in school (and in emergency circumstances where they do need to be in contact with parents/carers before or after school, pupil phones are held securely in the school safe during the school day. Games machines including the Sony Playstation, Microsoft Xbox and others may  have games that are age-inappropriate. Care is required in any use in school and must be supervised by staff. The appropriate use of Learning Platforms will be discussed as the technology  becomes available within the school. 5.1 Staff Use of personal Mobile Phones/cameras  Staff may be required to take personal mobile phones on trips. These must not be used to capture images of pupils, and ideally, should not be used to make contact with parents or pupils. Emergency calls, where necessary should go through the school office. School digital cameras are provided. Where personal digital cameras are used in  school, images should be downloaded in school, and memory cards formatted before and after use. Where possible, school-owned memory cards should be used in personal cameras and must be used solely for school purposes. 5.2 Protecting personal data  Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998 (see E-Security, Data Management and Protection Policy: Feb 2009) 6. Policy Decisions 6.1 Authorising Internet access  The school will maintain a current record of all staff and pupils who are granted access to school ICT systems through Policy Central software.
  • 4. All staff must read and sign the Staff AUP before using any school ICT resource.  At Key Stage 1, access to the Internet will be by adult demonstration with  supervised access to specific, approved on-line materials.  Parents will be asked to sign the AUP for their child to use the internet as part of the induction process. Children are asked to counter-sign the AUP after discussion with parents/carers. Any person not directly employed by the school will be asked to accept the AUP  before being allowed to access the internet from the school site. All users of the school computer system understand that the systems in place  afford no privacy. 6.2 Assessing risks  The school will take all reasonable precautions to prevent access to inappropriate material. However, due to the international scale and linked nature of Internet content, it is not possible to guarantee that unsuitable material will never appear on a computer connected to the school network. Neither the school nor Birmingham LA can accept liability for any material accessed, or any consequences of Internet access.  The school will audit ICT use on a regular basis to establish if the e-safety policy is adequate and that the implementation of the e-safety policy is appropriate and effective through informal/formal monitoring and the use of Policy Central. 6.3 Handling e-safety complaints  Complaints of Internet misuse will be dealt with by a senior member of staff.  Any complaint about staff misuse must be referred to the Head Teacher.  Complaints of a child protection nature must be dealt with in accordance with school and LA Child Protection Procedures.  If a serious breach of the AUP is discovered, the monitor of the PC in question should be turned off and the computer put ‘out of order’. This is to prevent the contamination of evidence that may be collected by outside agencies (e.g. police) if required.  Pupils and parents will be informed of consequences for pupils misusing the Internet. 6.4 Community use of the Internet  Any use of the school system by visitors will be bound by the terms and conditions in the AUP and will be monitored by the systems in place for pupils and staff. 7. Communications Policy 7.1 Introducing the e-safety policy to pupils  Pupils will be informed that network and Internet use will be monitored and appropriately followed up.  E-Safety rules will be posted in all rooms where computers are used and discussed with pupils regularly.  E-Safety training will be embedded within the ICT scheme of work and the Personal Social and Health Education (PSHE) curriculum. 7.2 Staff and the e-Safety policy  All staff will be given the School e-Safety Policy and its importance explained.  Staff are informed that network and Internet traffic is monitored and traced to the
  • 5. individual user and that there should be no expectation of privacy when using any school ICT equipment (including laptops used off-site). Senior staff manage filtering systems and monitor ICT use in collaboration with the  DSP and Headteacher.  Staff will always use the ‘safe search’ facilities within search engines when accessing the web with pupils and must check all search terms before use with pupils. Any staff member with an online identity’ (e.g. in social networking sites) will  ensure that access to this information is kept private and not shared with pupils at Chad Vale Primary School. 7.3 Enlisting parents’ and carers’ support  Chad Vale Primary School’s E-Safety Policy will be shared with parents and carers in the school newsletter, prospectus and school web site.  Parents with any concerns about E-Safety are encouraged to contact the school for further guidance and support.  Parents sign the Parent’s Consent Form on an annual basis after sharing our age appropriate safety rules with their child (see appendix)
  • 6. Chad Vale Primary School e-Safety Rules All pupils use computer facilities including Internet access as an essential part of learning, as required by the National Curriculum. Both pupils and their parents/carers are asked to sign to show that the e-Safety Rules have been understood and agreed. Pupil: Class: Pupil’s Agreement • I have read and I understand the school e-Safety Rules. • I will use the computer, network, internet and other new technologies in a responsible way at all times. • I know that network and Internet access is monitored. Signed: Date: Parent’s Consent for Web Publication of Work and Photographs/Video I agree that my son/daughter’s work may be electronically published. I also agree that appropriate images and video that include my son/daughter may be published subject to the school rule that images will not be accompanied by pupil names. Parent’s Consent for Internet Access I have read and understood the school e-safety rules and give permission for my son/daughter to access the Internet. I understand that the school will take all reasonable precautions to ensure that pupils cannot access inappropriate materials but I appreciate that this is a difficult task. I understand that the school cannot be held responsible for the content of materials accessed through the Internet. I agree that the school is not liable for any damages arising from use of the Internet facilities. Signed: Date: Please print name: Please complete, sign and return to Mr. Sansom
  • 7. Key Stage 1 and EYFS Safety Rules Key Stage 2 (Y3 and 4) Safety Rules
  • 8. Key Stage 2 (Y5 and 6) Safety Rules E-Safety Rules (Y5/6) These e-Safety Rules help to protect pupils and the school by describing acceptable computer use. • We follow the rules set by the school for the computer network and internet access. • We understand that irresponsible use may result in the loss of our network or internet access. • We access the computers using our own account and password, which must not be given to any other person. • We use the school network and Internet appropriately. • We do not copy other people’s work (text, music, images) without permission. • We write messages carefully and politely. • We don’t send anonymous messages or chain letters. • We keep our personal information private when using email, personal publishing, blogs or messaging. • We understand that our use of computers in school is monitored at all times.