Esafety for Ofsted - Icon Learning


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • New guidelines for e-safety and safeguarding were issued by Ofsted in September 2012. This means that during an inspection, Ofsted will look at how the school protects and educates staff and pupils in its use of technology, and what measures the school has in place to intervene and support, should a particular issue arise.
  • Esafety covers use of all tech not just desktop computers
  • Ceop free TUK half day training, £200 ambassador
  • Audit of children's behaviour
    Absence of esafety incidents
  • Audit of children's behaviour
    Absence of esafety incidents
  • Find Jigsaw video on CEOP channel on YouTube
  • How do you manage incidents at school? Are all staff aware of this?
  • Esafety for Ofsted - Icon Learning

    1. 1. E-safety in schools What is Ofsted looking for? Isabella Lieghio, CEOP Ambassador
    2. 2. Aims of today • Outline key features of outstanding practice with regard to e-safety and safeguarding • Audit current practice and identify next steps • Develop an understanding of how safeguarding is evaluated through an Ofsted inspection • Provide key links, resources and training opportunities
    3. 3. Ofsted describe e-safety as.... • To protect and educate pupils and staff in their use of technology • To have appropriate mechanisms to intervene and support an incident where appropriate
    4. 4. What would Ofsted use to make a judgement about your school?
    5. 5. Features of good and outstanding practice Whole school consistency •Teaching and non teaching staff aware of issues •E-safety a priority for SLT •High priority to e-safety training •Contribution of pupils and parents integrated
    6. 6. Features of good and outstanding practice Robust reporting processes •School based reporting routes u/s by all •Report abuse buttons eg CEOP •Clear routes to key staff
    7. 7. Features of good and outstanding practice Staff •Regular training for ALL staff •One or more staff with higher level of expertise and clearly defined roles •Training updated to reflect current research and new technologies •At least one accredited member (CEOP, EPICT)
    8. 8. Features of good and outstanding practice Policies •Rigorous policies and procedures in place •Updated regularly •Integrated with other policies eg safeguarding •AUP incorporated, understood and respected by pupils, parents and staff (signed?)
    9. 9. Features of good and outstanding practice Education •An age-appropriate, flexible, relevant, engaging esafety curriculum •Positive rewards used to cultivate responsible use •Peer mentoring programmes
    10. 10. Features of good and outstanding practice Infrastructure •Recognised ISP/RBC with age related monitored filtering Monitoring and Evaluation •Risk assessment taken seriously •Use data effectively to assess impact of e-safety practice Data management •Data managed securely (Data Protection Act 1998)
    11. 11. Features of good and outstanding practice Management of personal data Any professional communications between the setting and clients that utilise technology should: •take place within clear and explicit professional boundaries •be transparent and open to scrutiny •not share any personal information with a child or young person.
    12. 12. What does inadequate look like? • Personal data often unsecured / off site without encryption • Security of passwords ineffective • Generic policies which are not updated • No progressive, planned e-safety curriculum - eg annual assembly • No Internet filtering or monitoring • No evidence of staff training • Children unaware of how to report a problem
    13. 13. Types of risk • Content • Contact • Conduct • Commerci al
    14. 14. Social Networking risks • Revealing too much personal information • Privacy settings not set properly • Posting inappropriate images • Who checks these sites?
    15. 15. Social Networking risks
    16. 16. What is cyberbullying? • Threats or harassment by phone, email or online • Exclusion from groups • Posting information • Evidence
    17. 17. Technical risks • Viruses • Spam • Phishing
    18. 18.
    19. 19. What if something goes wrong?
    20. 20. Resources to support parent sessions
    21. 21. How big is your digital footprint?
    22. 22. Useful weblinks • • • @iconlearningict