SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Safeguarding and Risk Assessment in the learning
and skills sector
Phil Barnett
LSIS Associate
Aim
Aim:
To explore and apply a model of risk assessment to a
safeguarding challenge
Objectives
• To consider specific situations that should be subject to a risk
assessment process
• To identify appropriate interventions that can be applied in
order to mitigate against risk
• To review current organisational practice and identify how
these can be further improved
Definitions
Risk Management
Risk management is a central part of any organisation’s
strategic management. It is the process whereby
organisations methodically address the risks attached to
their activities with the goal of achieving sustained
benefit within each activity and across the portfolio of all
activities.
The focus of a good risk management process
is the identification and treatment of these risks.
Source: Institute of Risk Management (IRM) Risk
Management Standard
Risk Assessment
Who/what is at risk?
Risk Assessment
The workforce
Learners
The
Organisation
What is risk assessment?
A risk assessment is simply a careful examination of
what, in your organisations context, could cause
harm. You can then decide whether you have taken
enough precautions or should you do more to prevent harm.
Adapted from the Health and Safety Executive (HSE)
Risk Assessment Information sheet
Definitions
• Child or young person: up to their 18th birthday (UN convention
of the Rights of the Child)
• Vulnerable adult: a person who has attained the age of 18, and:
• Is receiving any form of health care
• Is receiving a service or participating in an activity which is
specifically targeted at people with age-related needs,
disabilities or prescribed physical or mental health conditions
or expectant or nursing mothers living in residential care
• Age-related needs includes needs associated with frailty,
illness, disability or mental capacity
For more details see Section 59 of Safeguarding Vulnerable
Groups Act 2006.
What are we safeguarding
learners from?
Safeguarding learners from
• Sexual abuse or inappropriate relationships
• Grooming
• Physical and emotional abuse or neglect
• Domestic violence
• Inappropriate parenting
• Inappropriate supervision by staff/volunteers i.e. ‘bad practice’
• Bullying, cyber-bullying
• Self-harm, risky behaviour
• Unsafe activities and environments
• Accidents e.g. road, home
• Crime
• Fear of crime
• Exploitation including financial abuse, sexual exploitation,
forced marriage
• Immigration issues
• Potentially unsafe environments e.g. parks, sports
grounds
• Homelessness and unsuitable housing
• Victimisation due to race, sexuality, faith, gender,
disability and so on
And…
Identifying the potential safeguarding risks:
Group Activity:
With these definitions in mind and from your
experience identify a range of safeguarding
situations that are subject to a risk
management and assessment process.
These might apply to learners, staff, visitors,
the organisation
When the list is complete prioritise them to
low, medium and high risk situations
Safeguarding and Risk Assessment
The following areas may be covered by your Risk
Assessment process:
• Trips
• Work placements
• Certain workshop/practical activity
• Lone Working
• Other Learners (where applicable)
• Home visits
• Mixed age groups within one learning cohort
• Multiple sites
• Travel between sites …………
The Five Steps to a Safeguarding Risk Assessment
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
Identify and
detail the situation
that could cause
potential harm
Decide who
might be
harmed and
how
Evaluate the
risk and
decide on
precautions
/interventions
Record and
report your
findings
and agreed
actions
Review your
assessment and
update if necessary
Operational thinking for the identification of risks
Likelihood of occurrence
Certain
6
Likely
5
Probable
4
Possible
3
Remote
2
Improbable
1
Catastrophic
4 24 20 16 12 8 4
Critical
3 18 15 12 9 6 3
Marginal
2 12 10 8 6 4 2
Negligible
1 6 5 4 3 2 1
Impact of
occurrence
MediumLow High
Deciding on the level of Risk
1-7 LOW 7-13 MEDIUM 13-24 HIGH
Low - If risk lies in the low category no additional direct action is required to
address the risk but it is worth identifying and recording so that
everyone is aware and measures can be taken to reduce the risk
should this become necessary.
Medium - Risk in the medium category poses a significant risk and therefore
countermeasures should be taken to reduce the likelihood of
occurrence and/or significance. Contingencies should also be in
place to deal with the risk should it occur.
High - High risks pose a substantial risk and should be evaluated to decide
whether they are tolerable or intolerable. If the risk is deemed
tolerable then activity should only be started once measures have
been taken to reduce the risk and satisfactory contingencies have
been put in place to minimise the impact of the risk
Source: Adapted from PRINCE2 risk management
Case Study Activity
Group presentations and
feedback
Dealing with the Risk
Once a risk has been identified and
analysed - What are the choices?
• Avoidance (eliminate, withdraw from or not become involved)
• Reduction (optimise - mitigate)
• Sharing (transfer - outsource or insure)
• Retention (accept and budget)
Some examples of how a
safeguarding risk can be mitigated
Mitigation
To appoint and train a
lunchtime supervisory team
To put in place escort
arrangements with the
security team
Safeguarding awareness
training for learners
Emergency contact
arrangements
Risk
14-16 year olds lunch
arrangements
Staff member who
needs to clear up after a
restaurant session
Apprentices in the
workplace
External inspection continued…
Compliance or commitment?
• The grade for safeguarding is a ‘limiting’ grade, which impacts
on grades for Leadership and Management and Overall
Effectiveness.
• Compliance is the minimum necessary requirement for a
judgement of ‘adequate’ in safeguarding
• Staff Training – The LSIS Safeguarding Training Modules are
recognised by OfSTED. It will be important for providers to
select the modules best suited to staff roles and responsibilities.
19 © LSIS Sept 2010 Company no 06454450 Registered charity No 1123636 Registered office: Friars House,
Manor House Drive, Coventry CV1 2TE
Further LSIS Safeguarding Training
• Safeguarding in the Learning and Skills Sector
• Safer Staff Recruitment and Safeguarding
• Safeguarding and Human Resource (HR) Practices and Procedures
• Safeguarding and Inspection
• Safeguarding Facilitator Workshop
• Safeguarding Designated Person Workshop
• In house and bespoke activities
Session Evaluation
• As a group reflect on the session and record the
following:
• 3 Low spots about the training
• 3 High spots
• 1 improvement
• In addition record for yourself one aspect that
you are going to take back to your workplace
Contact Details:
Learning and Skills Improvement Service,
Friars House,
Manor House Drive,
Coventry.
CV1 2TE.
(02476) 627 745
safeguarding@lsis.org.uk
Thank you

Más contenido relacionado

La actualidad más candente

Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides SlideTeam
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Introduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesIntroduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesSlideTeam
 
17 personal financial planning
17 personal financial planning17 personal financial planning
17 personal financial planningmaynardteacher
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Adnan Naseem
 
Business Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation SlidesBusiness Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation SlidesSlideTeam
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Genpact Ltd
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
The psychology of wealth creation through investments
The psychology of wealth creation through investmentsThe psychology of wealth creation through investments
The psychology of wealth creation through investmentsFrancis Kofi Somuah
 
Planning of Personal Finance | Finance
Planning of Personal Finance | FinancePlanning of Personal Finance | Finance
Planning of Personal Finance | FinanceDhanashri Academy
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxJayLloyd8
 
Personal Financial Management
Personal Financial ManagementPersonal Financial Management
Personal Financial Managementrexcris
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB
 
Top 10 health & safety interview questions with answers
Top 10 health & safety interview questions with answersTop 10 health & safety interview questions with answers
Top 10 health & safety interview questions with answersscottjohnson072
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesAlan McSweeney
 

La actualidad más candente (20)

Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides Risk Management Plan In Business PowerPoint Presentation Slides
Risk Management Plan In Business PowerPoint Presentation Slides
 
The Basics of a Business Continuity Plan
The Basics of a Business Continuity PlanThe Basics of a Business Continuity Plan
The Basics of a Business Continuity Plan
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Introduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation SlidesIntroduction To Risk Management PowerPoint Presentation Slides
Introduction To Risk Management PowerPoint Presentation Slides
 
17 personal financial planning
17 personal financial planning17 personal financial planning
17 personal financial planning
 
Compliance Risk Assessment
Compliance Risk AssessmentCompliance Risk Assessment
Compliance Risk Assessment
 
Personal finance
Personal financePersonal finance
Personal finance
 
Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)Risk Management Maturity Model (RMMM)
Risk Management Maturity Model (RMMM)
 
Business Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation SlidesBusiness Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation Slides
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
The psychology of wealth creation through investments
The psychology of wealth creation through investmentsThe psychology of wealth creation through investments
The psychology of wealth creation through investments
 
Planning of Personal Finance | Finance
Planning of Personal Finance | FinancePlanning of Personal Finance | Finance
Planning of Personal Finance | Finance
 
Effective Discipline at Home
Effective Discipline at HomeEffective Discipline at Home
Effective Discipline at Home
 
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptxBUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
BUSINESS-CONTINUITY-AND-DISASTER-RECOVERY.pptx
 
Personal Financial Management
Personal Financial ManagementPersonal Financial Management
Personal Financial Management
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
 
Top 10 health & safety interview questions with answers
Top 10 health & safety interview questions with answersTop 10 health & safety interview questions with answers
Top 10 health & safety interview questions with answers
 
Business Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery NotesBusiness Continuity And Disaster Recovery Notes
Business Continuity And Disaster Recovery Notes
 

Destacado

How to make appropriate learning materials for various
How to make appropriate learning materials for variousHow to make appropriate learning materials for various
How to make appropriate learning materials for varioustbirdcymru
 
The History of Vaccine
The History of VaccineThe History of Vaccine
The History of Vaccineemullera614
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibitionJisc
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc
 
Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyondJisc
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesJisc
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety dayJisc
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safetyJisc
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awarenessJisc
 
Janet: bring your own device
Janet: bring your own deviceJanet: bring your own device
Janet: bring your own deviceJisc
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialJisc
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe onlineJisc
 
How to use internet effectively
How to use internet effectivelyHow to use internet effectively
How to use internet effectivelyLenny
 
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Jisc
 
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 Connect more with peers and practice: Pecha Kucha sessions - Connected Appre... Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...Jisc
 
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Jisc
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...Jisc
 
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Jisc
 
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightClosing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightJisc
 

Destacado (20)

How to make appropriate learning materials for various
How to make appropriate learning materials for variousHow to make appropriate learning materials for various
How to make appropriate learning materials for various
 
The History of Vaccine
The History of VaccineThe History of Vaccine
The History of Vaccine
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics
 
Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyond
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resources
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety day
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learners
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safety
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awareness
 
Janet: bring your own device
Janet: bring your own deviceJanet: bring your own device
Janet: bring your own device
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorial
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe online
 
How to use internet effectively
How to use internet effectivelyHow to use internet effectively
How to use internet effectively
 
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
 
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 Connect more with peers and practice: Pecha Kucha sessions - Connected Appre... Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...
 
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
 
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightClosing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
 

Similar a E safety safeguarding and risk assessment

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxssuser107f14
 
Risk Management.pptx
Risk Management.pptxRisk Management.pptx
Risk Management.pptxGraciaSuratos
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTVolunteer Alberta
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Managementmyosh team
 
risk_assessment_presentation.pdf
risk_assessment_presentation.pdfrisk_assessment_presentation.pdf
risk_assessment_presentation.pdfAlexanderRose31
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enocasiconference
 
Debunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskDebunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskTony Zemaitis
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core ConsultingCORE Consulting
 
Module 15 - Risk Management.pptx
Module 15 - Risk Management.pptxModule 15 - Risk Management.pptx
Module 15 - Risk Management.pptxcaniceconsulting
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docxCPA Australia
 
Keeping children safe - standards iii
Keeping children safe - standards iiiKeeping children safe - standards iii
Keeping children safe - standards iiiFelixLozano
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfHari319621
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Risk Management
Risk ManagementRisk Management
Risk ManagementMjNuarin
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119KAYODE ADEBIYI
 

Similar a E safety safeguarding and risk assessment (20)

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
Risk Management.pptx
Risk Management.pptxRisk Management.pptx
Risk Management.pptx
 
risk management.pdf
risk management.pdfrisk management.pdf
risk management.pdf
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPT
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Management
 
Risk Management - Conference 2009 (A1)
Risk Management - Conference 2009 (A1)Risk Management - Conference 2009 (A1)
Risk Management - Conference 2009 (A1)
 
risk_assessment_presentation.pdf
risk_assessment_presentation.pdfrisk_assessment_presentation.pdf
risk_assessment_presentation.pdf
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_en
 
risk assessment
risk assessmentrisk assessment
risk assessment
 
Debunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskDebunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety Risk
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
 
Module 15 - Risk Management.pptx
Module 15 - Risk Management.pptxModule 15 - Risk Management.pptx
Module 15 - Risk Management.pptx
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docx
 
Keeping children safe - standards iii
Keeping children safe - standards iiiKeeping children safe - standards iii
Keeping children safe - standards iii
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Risk Assessment - Volunteer Engagement
Risk Assessment - Volunteer EngagementRisk Assessment - Volunteer Engagement
Risk Assessment - Volunteer Engagement
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
 

Más de JISC infoNet

Adding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveAdding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveJISC infoNet
 
Teaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingTeaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingJISC infoNet
 
Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! JISC infoNet
 
JISC Design Studio Overview
JISC Design Studio OverviewJISC Design Studio Overview
JISC Design Studio OverviewJISC infoNet
 
Embedding Business and Community Engagement
Embedding Business and Community EngagementEmbedding Business and Community Engagement
Embedding Business and Community EngagementJISC infoNet
 
The higher education academy associates bribery act training
The higher education academy associates bribery act trainingThe higher education academy associates bribery act training
The higher education academy associates bribery act trainingJISC infoNet
 
The Higher Education Academy Framework
The Higher Education Academy FrameworkThe Higher Education Academy Framework
The Higher Education Academy FrameworkJISC infoNet
 
Introduction to the Higher Education Academy
Introduction to the Higher Education AcademyIntroduction to the Higher Education Academy
Introduction to the Higher Education AcademyJISC infoNet
 
Handout for Mobile Learning Presentation
Handout for Mobile Learning PresentationHandout for Mobile Learning Presentation
Handout for Mobile Learning PresentationJISC infoNet
 
Implementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionImplementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionJISC infoNet
 
Mobile Learning infoKit
Mobile Learning infoKitMobile Learning infoKit
Mobile Learning infoKitJISC infoNet
 
2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1eJISC infoNet
 
Here's one I made earlier...
Here's one I made earlier...Here's one I made earlier...
Here's one I made earlier...JISC infoNet
 
What’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementWhat’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementJISC infoNet
 
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12JISC infoNet
 

Más de JISC infoNet (15)

Adding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveAdding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspective
 
Teaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingTeaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefing
 
Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox!
 
JISC Design Studio Overview
JISC Design Studio OverviewJISC Design Studio Overview
JISC Design Studio Overview
 
Embedding Business and Community Engagement
Embedding Business and Community EngagementEmbedding Business and Community Engagement
Embedding Business and Community Engagement
 
The higher education academy associates bribery act training
The higher education academy associates bribery act trainingThe higher education academy associates bribery act training
The higher education academy associates bribery act training
 
The Higher Education Academy Framework
The Higher Education Academy FrameworkThe Higher Education Academy Framework
The Higher Education Academy Framework
 
Introduction to the Higher Education Academy
Introduction to the Higher Education AcademyIntroduction to the Higher Education Academy
Introduction to the Higher Education Academy
 
Handout for Mobile Learning Presentation
Handout for Mobile Learning PresentationHandout for Mobile Learning Presentation
Handout for Mobile Learning Presentation
 
Implementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionImplementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your Institution
 
Mobile Learning infoKit
Mobile Learning infoKitMobile Learning infoKit
Mobile Learning infoKit
 
2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e
 
Here's one I made earlier...
Here's one I made earlier...Here's one I made earlier...
Here's one I made earlier...
 
What’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementWhat’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information Management
 
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
 

Último

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

E safety safeguarding and risk assessment

  • 1. Safeguarding and Risk Assessment in the learning and skills sector Phil Barnett LSIS Associate
  • 2. Aim Aim: To explore and apply a model of risk assessment to a safeguarding challenge
  • 3. Objectives • To consider specific situations that should be subject to a risk assessment process • To identify appropriate interventions that can be applied in order to mitigate against risk • To review current organisational practice and identify how these can be further improved
  • 4. Definitions Risk Management Risk management is a central part of any organisation’s strategic management. It is the process whereby organisations methodically address the risks attached to their activities with the goal of achieving sustained benefit within each activity and across the portfolio of all activities. The focus of a good risk management process is the identification and treatment of these risks. Source: Institute of Risk Management (IRM) Risk Management Standard
  • 5. Risk Assessment Who/what is at risk? Risk Assessment The workforce Learners The Organisation
  • 6. What is risk assessment? A risk assessment is simply a careful examination of what, in your organisations context, could cause harm. You can then decide whether you have taken enough precautions or should you do more to prevent harm. Adapted from the Health and Safety Executive (HSE) Risk Assessment Information sheet
  • 7. Definitions • Child or young person: up to their 18th birthday (UN convention of the Rights of the Child) • Vulnerable adult: a person who has attained the age of 18, and: • Is receiving any form of health care • Is receiving a service or participating in an activity which is specifically targeted at people with age-related needs, disabilities or prescribed physical or mental health conditions or expectant or nursing mothers living in residential care • Age-related needs includes needs associated with frailty, illness, disability or mental capacity For more details see Section 59 of Safeguarding Vulnerable Groups Act 2006.
  • 8. What are we safeguarding learners from?
  • 9. Safeguarding learners from • Sexual abuse or inappropriate relationships • Grooming • Physical and emotional abuse or neglect • Domestic violence • Inappropriate parenting • Inappropriate supervision by staff/volunteers i.e. ‘bad practice’ • Bullying, cyber-bullying • Self-harm, risky behaviour • Unsafe activities and environments
  • 10. • Accidents e.g. road, home • Crime • Fear of crime • Exploitation including financial abuse, sexual exploitation, forced marriage • Immigration issues • Potentially unsafe environments e.g. parks, sports grounds • Homelessness and unsuitable housing • Victimisation due to race, sexuality, faith, gender, disability and so on And…
  • 11. Identifying the potential safeguarding risks: Group Activity: With these definitions in mind and from your experience identify a range of safeguarding situations that are subject to a risk management and assessment process. These might apply to learners, staff, visitors, the organisation When the list is complete prioritise them to low, medium and high risk situations
  • 12. Safeguarding and Risk Assessment The following areas may be covered by your Risk Assessment process: • Trips • Work placements • Certain workshop/practical activity • Lone Working • Other Learners (where applicable) • Home visits • Mixed age groups within one learning cohort • Multiple sites • Travel between sites …………
  • 13. The Five Steps to a Safeguarding Risk Assessment STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 Identify and detail the situation that could cause potential harm Decide who might be harmed and how Evaluate the risk and decide on precautions /interventions Record and report your findings and agreed actions Review your assessment and update if necessary
  • 14. Operational thinking for the identification of risks Likelihood of occurrence Certain 6 Likely 5 Probable 4 Possible 3 Remote 2 Improbable 1 Catastrophic 4 24 20 16 12 8 4 Critical 3 18 15 12 9 6 3 Marginal 2 12 10 8 6 4 2 Negligible 1 6 5 4 3 2 1 Impact of occurrence MediumLow High
  • 15. Deciding on the level of Risk 1-7 LOW 7-13 MEDIUM 13-24 HIGH Low - If risk lies in the low category no additional direct action is required to address the risk but it is worth identifying and recording so that everyone is aware and measures can be taken to reduce the risk should this become necessary. Medium - Risk in the medium category poses a significant risk and therefore countermeasures should be taken to reduce the likelihood of occurrence and/or significance. Contingencies should also be in place to deal with the risk should it occur. High - High risks pose a substantial risk and should be evaluated to decide whether they are tolerable or intolerable. If the risk is deemed tolerable then activity should only be started once measures have been taken to reduce the risk and satisfactory contingencies have been put in place to minimise the impact of the risk Source: Adapted from PRINCE2 risk management
  • 16. Case Study Activity Group presentations and feedback
  • 17. Dealing with the Risk Once a risk has been identified and analysed - What are the choices? • Avoidance (eliminate, withdraw from or not become involved) • Reduction (optimise - mitigate) • Sharing (transfer - outsource or insure) • Retention (accept and budget)
  • 18. Some examples of how a safeguarding risk can be mitigated Mitigation To appoint and train a lunchtime supervisory team To put in place escort arrangements with the security team Safeguarding awareness training for learners Emergency contact arrangements Risk 14-16 year olds lunch arrangements Staff member who needs to clear up after a restaurant session Apprentices in the workplace
  • 19. External inspection continued… Compliance or commitment? • The grade for safeguarding is a ‘limiting’ grade, which impacts on grades for Leadership and Management and Overall Effectiveness. • Compliance is the minimum necessary requirement for a judgement of ‘adequate’ in safeguarding • Staff Training – The LSIS Safeguarding Training Modules are recognised by OfSTED. It will be important for providers to select the modules best suited to staff roles and responsibilities. 19 © LSIS Sept 2010 Company no 06454450 Registered charity No 1123636 Registered office: Friars House, Manor House Drive, Coventry CV1 2TE
  • 20. Further LSIS Safeguarding Training • Safeguarding in the Learning and Skills Sector • Safer Staff Recruitment and Safeguarding • Safeguarding and Human Resource (HR) Practices and Procedures • Safeguarding and Inspection • Safeguarding Facilitator Workshop • Safeguarding Designated Person Workshop • In house and bespoke activities
  • 21. Session Evaluation • As a group reflect on the session and record the following: • 3 Low spots about the training • 3 High spots • 1 improvement • In addition record for yourself one aspect that you are going to take back to your workplace
  • 22. Contact Details: Learning and Skills Improvement Service, Friars House, Manor House Drive, Coventry. CV1 2TE. (02476) 627 745 safeguarding@lsis.org.uk