Your SlideShare is downloading. ×
E safety training ~ what ofsted are looking for by stephen carrick-davies
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

E safety training ~ what ofsted are looking for by stephen carrick-davies

532
views

Published on

A presentation given by Stephen Carrick-Davies to staff on what the UK OFTED school's inspection team are looking for when it comes to E-safety. Please note that these slides should not be used in …

A presentation given by Stephen Carrick-Davies to staff on what the UK OFTED school's inspection team are looking for when it comes to E-safety. Please note that these slides should not be used in issolation from the training and re not a subsitute for full face to face training.

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
532
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies Parents: What is different about cyberbullying ? – form of bullying but some important things which are different Do parents recognise it and respond ? – knowing the key message to tell children. Seeing part of the whole school community. – if your Do they know what they can do once it has happened ? - know who to report –school,industry or police, Children and Young people are seeking validation, they are venting their frustrating, they are pulling pranks, getting even, impersonating, showing off, defaming bullying – no change there then !
  • Childnet presentation on Social Networking 26 June 2006 Stephen Carrick-Davies
  • Transcript

    • 1. SAFEGUARDING CHILDREN ONLINEWHAT IS OFSTED LOOKING FOR IN INSPECTING E-SAFETY ? By Stephen Carrick-Davies
    • 2. Introductions Stephen Carrick-Davies • Ten years at Childnet International • Now an Independent Trainer/ Social Entrepreneur /Writer/Parent/Learner ..... Here to help YOU better support the Young People you are responsible for.
    • 3. What are your expectations and training needs ?
    • 4. In the context of an inspection,e-safety may be described as theschool’s ability:to protect and educate pupils andstaff in their use of technologyto have the appropriatemechanisms to intervene andsupport any incident whereappropriate.
    • 5. On a scale of 1- 10 rank yourself as to how confident you are using social media.1 ----------------------5----------------------10 “I taught Mark Zuckerberg “What’s a all he knows” mouse?”What about: How confident you are to know the appropriatemechanisms to intervene and support any incident ?1 ----------------------5----------------------10
    • 6. Why this stuff matters ? Our safety, conduct Risk & risky behaviours Reputation Resilience Our privacy, security settings and our peer group Our leadership, ethical code and resilience
    • 7. APPLICATIONS PHOTOS/TAGS NEWS FEEDS Comment and “boast by post” Huge range of apps Tag photos face recognitionEvents/ Groups TIME LINE FRIENDS LIVE CHAT Find, link, be in Superseding IMconstant contact+ on your mobile VIDEO link and embedMESSAGESSuperseding E-mail WHO’S ONLINE Know who is online now! Social location ALL FOR FREE …… BUT ….WHAT PRICE IS FREE ?
    • 8. A word about BBM • Be careful with your BBM PIN • Be careful of ‘Screen Munching’ • Use the tools – like delete contact and block future requests. • Make sure your blackberry has a password See www.carrick-davies.com for film and tutorial. (bottom of the page)
    • 9. See pages 54 – 59 in Vodafone’s Digital Parenting magazine
    • 10. A word about games • The ratings are there for a reason. • Anyone who sells a designated 12+ title to younger children will face fines of up to £5,000 /jail. • Recognise the ‘compulsion’ issues. • Younger siblings and friends. • Misogynistic messages and casual cruelty.
    • 11. PART IIUnderstanding the risks (not the same thing as harm!)
    • 12. Classifying the risks to children onlineOriginal 3 Cs Classification by‘EU Kids’ online project Commercial Aggressive Sexual ValuesCONTENT Adverts Violent and Pornographic BiasChild as Recipient Spam hateful unwelcome Racist Sponsorship content sexual content Misleading Personal info info or adviceCONTACT Meeting Self harm Tracking Being bulliedChild as Participant Harvesting harassed or strangers Unwelcome Personal info stalked Being persuasions groomedCONDUCT Illegal Bullying or Creating and ProvidingChild as Actor downloading harassing uploading misleading Hacking Gambling another inappropriate info/advice Financial scams material Terrorism
    • 13. How the risks ‘migration’ from online to offline can affect vulnerable YPOriginal 3 Cs Classificationby ‘EU Kids’ online project Commercial Aggressive Sexual CRIMINAL ValuesCONTENTChild as Recipient OF THE 1,984 PEOPLE CHARGED AFTER RIOTS:  53% were under 20 years oldCONTACT  42% received free school mealsChild as Participant (16% nat. average)  66% of them had some special education needs (21% of all pupils)CONDUCTChild as Actor Figures from the Ministry of Justice carried out by the Howard League for Penal Reform (published in Guardian 26.11.11) BEING IN THE WRONG PLACE AT THE WRONG TIME & “BAD LUCK”
    • 14. “Sexting” = teens sharing nude photos via mobiles and web. The practice canhave serious legal and psychological consequences Commercial Aggressive Sexual Values CONTENT Pornographic Child as Recipient Online grooming is a unwelcome criminal offence sexual content Contact CONTACT www.ceop.gov.uk Meeting “So take a dirty Child as Participant if you have concerns strangers picture for me, Take a dirty picture about inappropriate Being Just take a dirty communication from an groomed picture for me Take a dirty picture” adult to a minor. CONDUCT From Taio Cruz song Creating and Child as Actor “One-third of those who uploading No 6 in the UK charts April 2010. sexually abuse children are inappropriate just children themselves.” material BBC Newsnight programme March 2010 21,630 BEBO members had the name “Porn Star”
    • 15. Film Play film Film at www.carrick-davies.com/research/filmsFilm conceived and acted by yp from Southwark see film and documentary abouthow we made the film at http://www.carrick-davies.com/research/films
    • 16. Classifying the risks to children online Commercial Aggressive Sexual ValuesCONTENT Violent andChild as Recipient hateful content 22% of yp aged 11-CONTACT 18 report having Being bulliedChild as Participant harassed or been cyber bullied. stalked It ruins lives. YP may not discloseCONDUCT that it is happeningChild as Actor Bullying or harassing another Classification by ‘EU Kids’ online project and referenced in the Byron Report
    • 17. “Sticks and stones.... But words ...?”From US Ad Council athttp://www.youtube.com/watch?v=bdQBurXQOeQ
    • 18. Ways in which Cyberbullying is different from offline bullying? OFFLINE ONLINE Home was sanctuary Can be 24/7 Usually words/pictures Often physical More complex + fast changing, invisible Clear to see intention audience, social rivalry, steganography* Power and roles can shift + Bully strong/victim weak change quickly even during activity. Local & intimate Barriers collapse with potential mass distribution but also wider help. See the impact Don’t see impact (lack of empathy) Bystanders intervene Bystanders take part (using Often silent mobile/SNS) It can leave a trail ! (keeping evidence) Closure is easier Closure harder - permanent, archivable* Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspectsthe existence of the message, a form of security through obscurity.
    • 19. PREVENTING RESPONDING Understanding and accepting the  Supporting the victim – need for impact of cyberbullying. reassurance. Updating existing policies and  Practical advice and support such as saving evidence, not retaliating, practices. (AUP anti-bullying) informing parents. Making reporting easier - includes  Investigate and record incidents, advice about removal of content. identify the bully. (industry support)  Working with the bully and sanctions Promoting the positive use of (including technology specific). technology.  Involve Parents /carers Evaluating impact of prevention activities. Underpinned by effective education and awareness
    • 20. Why YP may be scared of reporting abuse ?• “It was nobody else’s business”• “Didn’t think it was serious or wrong”• “Didn’t want parents/friends to find out”• “Was frightened”• “Didn’t think I would be believed”• “Had been threatened by the abuser” Source: Child Maltreatment in the UK Cawson 2000 Abuse on the internet/mobile phone • “My parents don’t get the internet” • “Maybe it was my fault ! (blur)” • “Scared if computer is confiscated”
    • 21. GROUP EXERCISEThe young person who you are responsible for (let’s sayshe’s a 12 year old girl) tells you that her “friends” in herclass took video clip of her at a sleep over pyjama party ontheir phones which is now being circulated and she thinks itis now posted on a social networking site.•What advice would you give to her ?•Who should the girl report this to ?•Is this a school issue ?•How would you go about trying to remove this content ?•What if those who posted it up have circulated it morewidely ?
    • 22. GROUP EXERCISE A 14 year old boy in your school has lost weight and you have concerns that he is self-harming.• What could be happening online ?• What could the online pressure be ?• What online support could help him ?• What if this person was posting images of himself on social networking and pro-harm sites ?
    • 23. Social media challenges for teachers• Social media applications are mostly designed around informality, intimacy and speed.• Contact with students outside of the classroom is not only easier it is actively encouraged. (VLEs, online collaboration etc).• BUT Young people can view one-to-one communication as a very private “chumminess” and feel especially valued.• The boundaries between professional/private expert and learner, home and work, formal and informal are blurring.• The technology can be used as vehicles for false allegations, and exposing teachers to ridicule and humiliation.• But... there are a range of views with some teachers wanting to positively embrace technology to support pupils and there are very real positives especially for some pupils (excluded, SEN,
    • 24. PIE all 3 ‘legs’ are vital Policies E-safety policy, Acceptable Use Policy, Anti-Bullying policy, Mobile use policyInfrastructure EducationManaged learning environment Whole-school ongoing educationwith high quality access and & prevention programme which isequipment which is filtered, targeted at both pupils, parentsmonitored and supervised. and the whole school work-force.
    • 25. Assemblies, tutorial time, personal, social, health and education lessons, and an age-appropriate curriculum for e-safety Pupils were moreSchools need vulnerable overallto make good when schools useduse of the locked downviews of pupils systems becauseand their WHAT they were notparents to DOES given enoughdevelop their opportunities toe-safety GOOD learn how toprovision. assess and manage E-SAFETY risk for LOOK themselves. LIKE?The outstandingschools recognised In the outstandingthat, relationships schools, senior leaders,with families, needed governors, staff andto keep developing to families worked togethersupport e-safety at to develop a clear strategyhome. for e-safety. Policies were reviewed regularly in the light of technological developments.
    • 26. Social media challenges for teachers• Recent TES survey found that 9% of teachers were friends with pupils on SNS*.• General advice from unions and GTS is: Do not ‘friend’ pupils on personal accounts or ask to be added to their contact lists. WHY ? You could make yourself You could make yourself You could make yourself vulnerable by sharing your vulnerable by being able to open to allegations of personal information (and access their personal inappropriate contact or be that of your friends) information misunderstood. http://community.tes.co.uk/forums/t/463065.aspx?s_cid=16 See http://www.childnet.com/kia/downloads/Social-networking.pdf for Childnet/TDA leaflet
    • 27. The role of schools in respond to Cyberbullying ?• All UK schools must have an anti-bullying policy by law.• If your child is bullied online by other children in a school even if it takes place outside of school hours or holidays it IS a school issue.• Ofsted inspects on safeguarding very closely (limiting factor !)• Government Guidance on cyberbullying is comprehensive and includes bullying of school staff!• Increasingly vital to have clear whole-school E-Safety and Acceptable Use Policies (AUPs)• Involving parents is crucial to a ‘whole-school’ policy
    • 28. OTHER WAYS TO PROTECTING YOURSELF1. Update your AUPs stating how and when personally owned equipment (including camera phones) can be used.2. Make sure you have a strong password and set a password or pin for your phone. Increasingly important for Facebook ‘Fraping’3. Close down computers quickly if you have to leave a room and don’t allow cookies to ‘remember your password’4. Do not post information about yourself publically that you wouldn’t want employers, colleagues, pupils or parents to see.5. Make sure you do not retaliate but keep all records – screen prints and record time, date & website addresses6. Report any incident to the appropriate member of staff promptly7. Make sure the school informs parents about incidents and delivers appropriate sanctions
    • 29. The importance of reaching parents/carers For Parents For Young people• Be aware that your children may as • Always respect others be careful what likely cyberbully as be a target of you say. cyberbullying. • Think before you send, what goes• Talk to your children and understand online stays online ! the ways in which they are using the • Treat your password like your internet and mobile phones. toothbrush ! • Learn how to block the bully and save• Use the tools on the services the evidence• Remind your children not to retaliate • Make sure you tell someone• Remind yp to keep the evidence • Support others – how would you feel• Know where to report (see later) if no-one stood up for you ! • Encourage them to produce their own peer advice media !
    • 30. 10 THINGS SCHOOLS CAN DO TO REACH PARENTS1. Update and publicise your school’s Acceptable Use Policy (AUP) stating how you use technology including mobiles and photographs . Include e-safety advice on this.2. Include news items in school newsletter especially at time of national news story or concern3. Advice posters in the corridors/playground.4. Survey – using ‘Survey Monkey’ or students to get feedback which you can then respond to (more buy in).5. Advice and reporting buttons on School website6. Regular sessions with students with take home advice7. Assembly or play involving pupils which parents come to.8. Creative sessions during mainstream activities (winter or summer fair, SATs meetings, trips etc)9. Re-enforced during induction sessions when a child joins the school AND staff induction.10. Investing in free resources Eg Digital Parenting.
    • 31. Useful websites 1) Child Exploitation and Online Protection Centre www.ceop.gov.uk 2) Childnet International www.childnet.com/ including Cyberbullying film and guidance for teachers 3) OFSTED http://www.ofsted.gov.uk/resources/
    • 32. THANK YOU ! Complete Evaluation forms MUNCH PING POKE! See my current work re social media and vulnerable yp on my website www.carrick-davies.comstephen@carrick-davies.com