eSafety
Safety in a digital world
ESafety Issues
1. Safeguarding is inspected by Ofsted
2. Worried about Learners online behaviour
3. Staff skills don’t mat...
Digital Natives?
Adults?
ICT
– Download
– Consume
– Corporate
– Separate media
– Static
Young people?
Web 2-3
– Uploading
...
Web 2 and 3
Adults?
ICT
– Download
– Consume
– Corporate
– Separate media
– Static
Young people?
Web 2-3
– Upload
– Create...
eResponsibility
In the post-16 sector online safety must be a
two-way process
 Learners need digital values to protect th...
eResponsibility
 Digital Values
 Controlling Digital Identity
 Demonstrating Digital Professionalism
 Disseminating Di...
ESafety in ACL
Think eResponsibility!
Teach Digital Values
Delegate responsibility to delivery managers
Integrate e-safety...
Self Assess to Risk Assess
 Look properly at your own practice
 Make proper assessment of the real risks to
learners - i...
eSafety Risk Scenarios
Activity Learner
skills
Staff
Awareness
Institutional
Risk
Response
Password
Security
Online
resear...
ACL ESafety Policy
What does it cover?
 Internet websites and VLE’s
 Chat/rooms, SMS and email
 Social Networking and B...
AEG ESafety Policy
What are the Risks and do they apply to you?
 Inappropriate or illegal material
 Cyber-bullying of an...
Responsibilities
Learners are expected to:
 Behave in a safe and responsible manner
 Treat equipment with respect
 No b...
Responsibilities
Staff are expected to:
 Undergo training provided
 Read and accept the esafety policy and AUP
 Include...
Digital Values
Protecting yourself and others online
• Strong passwords and security awareness
• Cautious information shar...
Another bogus email..
Phishing email
This email address is a genuine email
address of HMRC but it does NOT
mean it was from them… this is a
clev...
Digital Identity
Go to View > Header & Footer to edit September 17, 2013 | slide 22
Acl esafety awareness
Acl esafety awareness
Upcoming SlideShare
Loading in …5
×

Acl esafety awareness

327 views
281 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
327
On SlideShare
0
From Embeds
0
Number of Embeds
23
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  •   Not easy to say? I was going to use these cards and shout out   Write it on the cards or text it to me   Try to remember which 4 you are most interested in. HOLD those numbers might want to come back to them in a minute Name and email address to get ppt.
  • There has been a seed change in the way we use technology since web 2. We are uploading, creating and collaborating where we were downloading and consuming.. Digital Native or not ... Young people are routinely using personal devices, phones and games consoles to share their information - not just photos, GPs location – checking into Facebook and places, downloading QR codes to their phones that trigger url’s to websites or download PDF docs. Notice you can check your friends in too.
  • So it’s actually the Digitial landscape that is changing...web 1 web 2 and now web 3 We can anticipate a stream of learners challenging our way of doing things and out-skilling us in the use of technology because they are ‘digital natives’ or don’t recognise the dangers If you don’t use face-book and a smart phone you are entitled to be nervous especially as you have got responsibilities in this alien world. We can’t just ignore the massive changes in our day to day lives that technology - you can’t just lock things down as before and hope for the best – a single smart phones can bypass the filtering, and anyway I’m here to encourage you to utilise the benefits of technology in teaching.
  • We are talking: Establishing Digital Values, Controlling Digital Identity, Demonstrating Digital Professionalism, Disseminating Digital skills Learners have to be taught to protect themselves and recognise the effects of their behaviour on each other. They need to learn digital values just like elsewhere in life. If we are giving staff responsibilities then we ought to give them the skills to protect the learners in their care and increasingly their own professional reputation with clear policies on the use of social media and personal devices. Organisations must assess the real risks to their own staff and learners by actually asking them ...again and again as the new technology emerges. Legal requirements and professional standards that apply must be acknowledged and must be monitored and evidenced September 17, 2013
  • We are talking: Establishing Digital Values, Controlling Digital Identity, Demonstrating Digital Professionalism, Disseminating Digital skills Learners have to be taught to protect themselves and recognise the effects of their behaviour on each other. They need to learn digital values just like elsewhere in life. If we are giving staff responsibilities then we ought to give them the skills to protect the learners in their care and increasingly their own professional reputation with clear policies on the use of social media and personal devices. Organisations must assess the real risks to their own staff and learners by actually asking them ...again and again as the new technology emerges. Legal requirements and professional standards that apply must be acknowledged and must be monitored and evidenced September 17, 2013
  • In ACL the diversity of age and ability learners, the learning situations, courses, delivery methods is huge our advice to ACL and WBL created a resource to help Think eResponsibility! In the learning and skills sector e-safety relies on responsible behavior from learners and staff. Focus on promoting digital values and how technology can support learning when used properly. Make someone in senior management responsible for e-safety and set up a group that brings together curriculum, technical and safeguarding staff to form e-safety policy. Integrate e-safety policy into all your key organizational policies, internal quality systems and review processes to encourage whole organizational involvement. Get learners involved . Make e-responsibility part of their induction and link it to the student code. Check that they are learning and keep up with how they are using technology. Set out clearly defined reporting process, responsibilities and consequences. Aim to ensure that everyone understands what they need to do through staff training and contracts. Get advice and support from JISC Advance -JISC legal, JISC TechDis and JISC RSC offer resources and support with eSafety strategy. Your local RSC can help with assessing your current practice and the real risks to your learners and offer CPD for staff.
  • FE, ACL and WBL providers are making good use of technology to teach a very diverse range of learners. Many are adults and many more competent with IT than their teachers. Because both learner and provider have responsibilities to fulfill eSafety policy should be about encouraging responsible online behavior by promoting Digital Values and providing the digital skills that staff and learners need to protect themselves and each other when using technology.
  • What is the most serious risk
  • Must not Arrange to meet anyone over the internet or share personal details Engage in chat rooms Send forward or store inappropriate materials
  • Passwords: Never write them down – find another way to remember them – KeePass locks all your passwords in a safe – with one password Never share them – it s probably a disciplinary because of data protection and invalidates financial contracts Personal information - photos –tagging friends and auto tagging in face book Respect for your self - Digital Dirt Teenager fired for saying job was boring http://www.youtube.com/watch?v=bP4clzrDgy0&feature=related Ownership – copyright and referencing sticking to terms of use. Not doing things that are illegal. Giving away contact details and then Respect for others – The rules are the same as off line. Is cyberbullying listed in the student code..? Interfering with someone’s wellbeing and ability to study. Cyberbullying videos, campaigns and ‘sites’ like Formspring and little gossip exist just to dish the dirt - as well as everyday facebook slanging matches. There are any number of videos aimed at fighting cyberbullying and grooming. SMOKESCREEN – based on a social networking site and authored by young people is an education for all of us. ... and then there Stalking. I have included this video because it fits in with the idea of digital identity and has a double edged young persons perspective. September 17, 2013
  • Face book defaults protect users under 18 But not if they tick suggest friends or check me in But did you know... That suggest photos of me to friends uses face recognition to auto-tag you?
  • The next two slides are taken from an LSIS resource and session plan on the Excellence Gateway http://www.excellencegateway.org.uk/node/1363 The context is Being careful about giving out information – who has it come from and who is it going to? An example of a bogus email – point out that the web address (1) is different when you hover over the text (2). The next slide will show the issues clearly.
  • Click to reveal each tell tale sign that this is a bogus email. Lastly a green link will appear at the bottom of the slide. If you have time and you feel it is appropriate you can click the link to see proof from the HMRC website that this email is bogus. If you click the link it will prompt your internet browser to open at the correct webpage - it can take a few seconds so don’t panic – just wait. When you have finished looking at the webpage you can close the browser and you should return to this slide ready to continue the presentation.
  • Think before you post – Video demonstrates how posting a photo online can get out of your hands. Not too sinister but makes the point for young people. http://www.teachertube.com/viewVideo.php?video_id=660&title=Think_Before_You_Pos
  • Never forward chain emails or threatening emails except to report them – screen grab instead And remember that web-bots can read and copy an email address. Use different accounts for different things Google mail, hotmail all free and easy to ditch
  • Respect yourself There are lots of examples designed to put the fighteners on you but the issues are real. You’re having fun acting on impulse today but what about tomorrow. Digital dirt A real teenager sacked for posting she was bored and teachers sacked because of their holiday snaps. http://www.youtube.com/watch?v=bP4clzrDgy0&feature=related
  • You can check your digital profile and find out who is following you. But beware who’s following you following them following you...
  • Acl esafety awareness

    1. 1. eSafety Safety in a digital world
    2. 2. ESafety Issues 1. Safeguarding is inspected by Ofsted 2. Worried about Learners online behaviour 3. Staff skills don’t match learner savvy 4. Already got a problem with Social Networking 5. Worried you might get sued 6. Unclear advice on risk and responsibility 7. Use of personal devices to bypass filtering 8. Your own Professional/Digital Reputation
    3. 3. Digital Natives? Adults? ICT – Download – Consume – Corporate – Separate media – Static Young people? Web 2-3 – Uploading – Creating and collaborating – Personalising – Converged media – Interacting communities – Responsive: QR codes, GPS locations
    4. 4. Web 2 and 3 Adults? ICT – Download – Consume – Corporate – Separate media – Static Young people? Web 2-3 – Upload – Create – Personalise – Converged media – Interactive
    5. 5. eResponsibility In the post-16 sector online safety must be a two-way process  Learners need digital values to protect themselves and each other online  Staff need the skills to protect their learners and guidance for their own professional reputation  Organisations must re-assess the real risks to their own staff and learners through consultation  Legal requirements and professional standards apply and must be evidenced and monitored Go to View > Header & Footer to edit September 17, 2013 | slide 5 - eResponsibility
    6. 6. eResponsibility  Digital Values  Controlling Digital Identity  Demonstrating Digital Professionalism  Disseminating Digital Skills and Literacy Go to View > Header & Footer to edit September 17, 2013 | slide 6
    7. 7. ESafety in ACL Think eResponsibility! Teach Digital Values Delegate responsibility to delivery managers Integrate e-safety policy into contracts Get learners involved in reporting and monitoring Get staff trained to assess risks appropriately Get advice and support from JISC RSC’s www.jiscrsc.ac.uk https://eresponsibility.pbworks.com Go to View > Header & Footerdit September 17, 2013 | slide 7
    8. 8. Self Assess to Risk Assess  Look properly at your own practice  Make proper assessment of the real risks to learners - if there are any at all  What does the service contract require of you?  Does the eSafety policy and procedure fit?  What evidence could you provide - for inspection? Go to View > Header & Footer to edit September 17, 2013 | slide 8
    9. 9. eSafety Risk Scenarios Activity Learner skills Staff Awareness Institutional Risk Response Password Security Online research Social Networking Collaborative Writing E-books Personal Devices
    10. 10. ACL ESafety Policy What does it cover?  Internet websites and VLE’s  Chat/rooms, SMS and email  Social Networking and Blogs  Podcasting and video  Video and cameras including mobile phones Go to View > Header & Footer to edit September 17, 2013 | slide 11
    11. 11. AEG ESafety Policy What are the Risks and do they apply to you?  Inappropriate or illegal material  Cyber-bullying of any kind on any medium  Identity, data or financial theft  Copyright, IPR and the law  Gambling, financial scams  Grooming and inappropriate contact
    12. 12. Responsibilities Learners are expected to:  Behave in a safe and responsible manner  Treat equipment with respect  No bullying or insulting behaviour  Use the resources for education only  Keep password secure  Act within the law and the policy  Report incidents – and know how to
    13. 13. Responsibilities Staff are expected to:  Undergo training provided  Read and accept the esafety policy and AUP  Include it in the staff handbook – contract?  Act accordingly  Report any suspicion of misuse To who ?  Help educate learners and act as role models  Pre-check sites and manage searches  Promote critical and legal awareness
    14. 14. Digital Values Protecting yourself and others online • Strong passwords and security awareness • Cautious information sharing – everyone’s • Respect for yourself protect your profile • Ownership – copyright and referencing • Care with web forms txt messages and emails • Respect for others in online communities • Facebook for educators Go to View > Header & Footer to edit September 17, 2013 | slide 15
    15. 15. Another bogus email..
    16. 16. Phishing email This email address is a genuine email address of HMRC but it does NOT mean it was from them… this is a clever disguise This email address is a genuine email address of HMRC but it does NOT mean it was from them… this is a clever disguise Did you even make a tax return recently? I didn’t when I received this email. If you’re not sure – ring them. Did you even make a tax return recently? I didn’t when I received this email. If you’re not sure – ring them. http://www.hmrc.gov.uk/security/examples.htm This is the biggest danger of this email… the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC This is the biggest danger of this email… the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC
    17. 17. Digital Identity
    18. 18. Go to View > Header & Footer to edit September 17, 2013 | slide 22

    ×