• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
E safety in post-16 education
 

E safety in post-16 education

on

  • 571 views

This is a presentation I did at the JISC REgional Support Centre Learning REsources Conferences. The audience was librairians in post-16 education institiutions. It includes the support that the JISC ...

This is a presentation I did at the JISC REgional Support Centre Learning REsources Conferences. The audience was librairians in post-16 education institiutions. It includes the support that the JISC Regional support Centre can offer

Statistics

Views

Total Views
571
Views on SlideShare
570
Embed Views
1

Actions

Likes
0
Downloads
2
Comments
0

1 Embed 1

https://twitter.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Double approach so that you don’t get caught with your trousers down – or unprepared
  • There has been a seed change in the way we use technology since web 2. We are uploading, creating and collaborating where we were downloading and consuming.. Digital Native or not ...Young people are routinely using personal devices, phones and games consoles to share their information - not just photos, GPs location – checking into Facebook and places, downloading QR codes to their phones that trigger url’s to websites or download PDF docs. Notice you can check your friends in too.If you don’t use face-book and a smart phone you are entitled to be nervous especially as you have got responsibilities in this alien world.We can’t just ignore the massive changes in our day to day lives that technology - you can’t just lock things down as before and hope for the best – a single smart phones can bypass the filtering, and anyway I’m here to encourage you to utilise the benefits of technology in teaching.
  • eSafety covers a wide range of issues but Content Contact and Conduct are the three that cover the issues for educationAnd should not be seen as a technical problemYoung people are technically savvy and enthusiastic but need education around the risks and threats to on and off line lifeAnd they are as much as threat to each other than the passive victimIt is all about assessing and responding to real risk
  • Why are we worried and what worries you?Write it on the board/chart? Not easy to say – organisational and professional risk? Write it on the cards or text it to me Try to remember which 4 you are most interested in.HOLD those numbers might want to come back to them in a minuteName and email address to get ppt.
  • We are talking: Establishing Digital Values, Controlling Digital Identity, Demonstrating Digital Professionalism, Disseminating Digital skillsLearners have to be taught to protect themselves and recognise the effects of their behaviour on each other. They need to learn digital values just like elsewhere in life.If we are giving staff responsibilities then we ought to give them the skills to protect the learners in their care and increasingly their own professional reputation with clear policies on the use of social media and personal devices.Organisations must assess the real risks to their own staff and learners by actually asking them ...again and again as the new technology emerges.Legal requirements and professional standards that apply must be acknowledged and must be monitored and evidenced
  • Passwords:Never write them down – find another way to remember them –KeePass locks all your passwords in a safe – with one passwordNever share them – it s probably a disciplinary because of data protection and invalidates financial contractsPersonal information - photos –tagging friends and auto tagging in face bookRespect for your self - Digital DirtTeenager fired for saying job was boringhttp://www.youtube.com/watch?v=bP4clzrDgy0&feature=relatedOwnership – copyright and referencing sticking to terms of use. Not doing things that are illegal.Giving away contact details and then Respect for others – The rules are the same as off line. Is cyberbullying listed in the student code..? Interfering with someone’s wellbeing and ability to study. Test that you know where the line is for appropriate behaviour online. List of quizzes and eSafety assessments to choose from to suit age and issue i.e. A Thin Line http://www.athinline.org/Cyberbullying videos, campaigns and ‘sites’ like Formspring and little gossip exist just to dish the dirt - as well as everyday facebook slanging matches. There are any number of videos aimed at fighting cyberbullying and grooming.SMOKESCREEN – based on a social networking site and authored by young people is an education for all of us.... and then there’s Stalking. I have included this video because it fits in with the idea of digital identity and has a double edged young persons perspective.
  • Handout Scenarios – 10 – 60 minutesCould be on screen or as a group activity – with action planning if appropriate.Add any other relevant scenarios that help to put the points across. i.e. ACL & WBL – what role does a centre manager / have in enforcing an AUP if a tutor doesn’t comply to password security?VL – Setting up an eBay account for a VL?The aim here is to get each to address their own organisations / departments risk and responsibility – you may not have the answer
  • Points to raise:-As you are also a friend of the teacher in question he could also be unwittingly revealing some of your personal informationIt could be worth including online behavior awareness raising into information skills sessions or add guidance to the library’s calendar of events (i.e. part of Internet safety week, for example).http://www.youtube.com/watch?v=FDeRKFi0u2g Orange’s “Digital Dirt” video is a good one to show the link between online behavior and employabilityA discreet chat with your friend is also a must!
  • Foursquare is a legitamate and entirely above board game currently being used extensively in commercial marketing. While it is a matter for your e-safety working group to decide whether it is safe for students to access and use it should be noted that it is probably being used on mobile devices so a ban may not be enforceable and as it is a popular marketing tool a ban may be undesirable as it could impede learning.
  • It’s hard to decide the balance between allowing students open access all websites to aid learning, and the duty of care to protect them from harm. You may choose to have a comprehensive information literacy programme to teach students to evaluate sites (and other sources of information) or, as an e-safety working group, you may decide that some sites are too risky to allow,You may want to think about how you approach this issue – from a blacklist (all sites are OK unless otherwise stated) or a white list (all sites are barred unless otherwise stated) approach. The white list approach must consider the impact that it could have on teaching & learning activityFrom and Information Literacy point of view, this should be embedded in as many teaching sessions as possible, along with specialist LRC sessions, to equip learners with the skills to interpret and present information from possibly unreliable sources.In terms of this particular student, there may also be a duty of care issue, which should be referred following general safeguarding policies.
  • People can write what they like on their facebook page, as long as it conforms to the law and facebook terms and conditions. However, it may be worth chatting to him about his open profile. Employers often check facebook profiles and having that kind of content will do him no favours at all!
  • This shows the difficulty in having an inflexible policy. Student / Tutor relations can be dangerous and you may choose to discourage them – but banning them is often impractical , especially as students often know teachers outside college already.
  • There are several issues here: Cyber Bullying / HarassmentBreach of Terms of Service (ToS)Possible distribution of an indecent imageIn terms of the bullying aspect, your policies on e-safety, bullying and maybe even social media, should be instigatedCreating false profiles is a breach of almost every social media sites terms and conditions and the profile and, if known, profile creators should be reported for breaching itA “pseudo photograph” is also a photograph in terms of the Protection of Children Act 1978 * so it is possible an offence has been committed and the college should seek legal and/or police advice on this * This is NOT to be taken as legal advice
  • This demonstrates the importance of havinga clear policy on what is and isn’t acceptable, even on personal accountsan understanding of what is public and what is private and how to set privacy settingsThe importance of understanding digital identity and how we balance personal and professional accounts.Note that separating the two is not always advisable and enforcing it could mean less effective social media use
  • Show videos
  • How do you appear online? What is your Digital Profile like?Run Video - Respect yourself There are lots of examples designed to put the fighteners on you but the issues are real. You’re having fun and acting on impulse today but what about tomorrow? Digital dirt A real teenager has been sacked for posting that she was bored and teachers have been sacked because of their holiday snaps online.http://www.youtube.com/watch?v=bP4clzrDgy0&feature=related
  • What are the consequences of giving out too much information?Show video and discuss in context of relevant risk to learners – adults, under 16’s, Vulnerable Learners, residential settings, friends and colleagueshttp://www.teachertube.com/viewVideo.php?video_id=660&title=Think_Before_You_Pos
  • Should behaviour online be different to off-line? Why Not? Anonymity/everyone does it/ it’s just for fun/http://www.youtube.com/watch?v=2Qkc9VfDYLc real life facebookTeenage guruz http://www.youtube.com/watch?v=zjkdavG8PnI&feature=related
  • Make a direct link between the code requirements and policies and say Cyberbullying
  • For Ofsted - It’s all about assessing risk and evidencing that you have done so through your policies, procedures and practice.Standards and Inspection https://eresponsibility.pbworks.com/w/page/34940070/Standards-and-Inspection
  • Think eResponsibility! In the learning and skills sector e-safety relies on responsible behavior from learners and staff. Focus on promoting digital values and how technology can support learning when used properly.Make someone in senior management responsible for e-safety and set up a group that brings together curriculum, technical and safeguardingstaff to form e-safety policy. Integrate e-safety policy into all your key organizational policies, internal quality systems and review processes to encourage whole organizational involvement.Get learners involved. Make e-responsibility part of their induction and link it to the student code. Check that they are learning and keep up with how they are using technology.Set out clearly defined reporting process,responsibilities and consequences. Aim to ensure that everyone understands what they need to do through staff training and contracts. Get advice and support from JISC Advance -JISC legal, JISC TechDis and JISC RSC offer resources and support with eSafety strategy. Your local RSC can help with assessing your current practice and the real risks to your learners and offer CPD for staff.
  • Must not Arrange to meet anyone over the internet or share personal details Engage in chat rooms Send forward or store inappropriate materials
  • Visit our JISC RSC UK website to find out more about what we offer.Contact your regional eSafety lead http://www.jiscrsc.ac.uk/esafety.aspx
  • JISC RSC Advisors will take you through eSafety from a stragetic perspective using a range of resources brought together into one place with added context for FE & Skills sector: JISC RSC e-Safety Resource wiki. Including sector specific advice and support from JISC legal and JISC TechDis. You can search for links to useful documents such as the JISC Legal eSafety Policy checklist (http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/esafetychecklist.pdf ) or Policy Template. You RSC advisor will help get you started.
  • View the JISC legal eSafety Policy ChecklistComplete the JISC Legal eSafety Templatehttp://www.jisclegal.ac.uk/ManageContent/ViewDetail/ID/1747/e-Safety-Policy-Template-28102010.aspx http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/esafetychecklist.pdf

E safety in post-16 education E safety in post-16 education Presentation Transcript

  • A belt and braces approach to promotingsafe behaviours in the libraryDeborah JudahElearning Advisor RSC YH(HE, e-Safety and e-assessment)
  • Encouraging digital values and responsible behaviour online What are the issues and why Understand e-Responsibility Understand digital values Explore some of the issues using scenarios Where to go from here
  • Digital Natives?Web 1.0 Web 2.0 – Download – Uploading – Consume – Creating – Corporate – collaborating – Separate – Personalising media – Converged media – Static – Interactive – Responsive:
  • What are the Issues? Content students access & post online Who students and staff contactand who they allow to contact them How students conductthemselves online. Including: cyberbullying; sexting; pro-harm sites, etc How do staff conduct themselves online. Including photos, “friends”, comments etc Digital Identity – Now and in the future
  • Why are you worried?1. Safeguarding is a Limiting Grade at Ofsted2. Worried about Learners online behaviour3. Staff skills don‟t match learner savvy4. Already got a problem with Social Networking5. Worried you might get sued6. Unclear advice on risk and responsibility7. Use of personal devices to bypass filtering8. Your own Professional/Digital Reputation
  • eResponsibility Enabling staff to develop skills and knowledge Encouraging learners to become Informed Users able to identify risks and act to protect themselves and others Ensuring that all users are aware of and avoid potential misuse of technology Supporting both in identifying risks and acting to protect themselves Persuading users to behave responsibly online through education, policies and sanctions Provision of a clear procedure and confidential support process so that users have a mechanism to report any concerns or communications they have encountered on lineGo to View > Header & Footer to edit November 9, 2012| slide 6
  • Digital ValuesProtecting yourself and others online Strong passwords and security awareness Cautious sharing information – everyone‟s Respect for yourself - protect your profile Respect for others in online communities Ownership – copyright and referencing Care with web forms, txt messages and emailsGo to View > Header & Footer to edit November 9, 2012| slide 7
  • eSafety Risk Scenarios What level of risk? How would you know? What action would you take? Who would need to be involved? What are the risks? Are some at greater risk? Could this scenario escalate?
  • You overhear a couple of students talking atthe enquiry desk about looking up theirteachers on Facebook and have found thattheir Public Services lecturer has his privacysetting set to public and they can see all of hisposts(many of which are quite controversial and areabout how he doesn‟t like his job…).You know the teacher in question very well,as they are also your friend on Facebook.
  • What is Your Digital Identity?Digital Dirthttp://www.youtube.com/watch?v=bP4clzrDgy0&feature=related
  • ... The Real Facebookhttp://www.youtube.com/watch?v=2Qkc9VfDYLcGo to View > Header & Footer to edit November 9, 2012| slide 19
  • Safeguarding and ICT Safety issues are the same as offline Link eResponsibility with learner code – Making learning successful for everyone – Play an active part in equality and diversity – Reporting inappropriate behaviour • Threats, racism, disrespect, disruption, damage to college.
  • Ofsted Requirementsshow a clear requirement to keep learners safewhen using technology in the organisational settingthe importance of equipping learners with the skillsand knowledge to keep themselves safe wheneverand wherever they go onlineHow are you going to demonstrate it?
  • Key Steps In Esafety Think eResponsibility! -Digital Skills & Values SMT backing – across the whole organisation Assess your current practice Integrate eSafety into Organisational Policy Get learners involved- induction and feedback Clearly define roles in the reporting process Get Advice from JISC
  • ResponsibilitiesStaff are expected to: Undergo training provided Read and accept the esafety policy and AUP Include it in the staff handbook Act accordingly Report any suspicion of misuse Help educate learners and act as role models Pre-check sites and manage searches Promote critical and legal awareness
  • ResponsibilitiesLearners are expected to: Behave in a safe and responsible manner Treat equipment with respect No bullying or insulting behaviour Use the resources for education only Keep password secure Act within the law and the policy Report incidents – and know how to
  • JISC RSC „s Esafety Offer Awareness Workshops – – eResponsible behaviour and Digital Values Strategic consultations on key steps – Key Steps, Policy and procedures Staff Development – Sector Specific, legal and technical requirements Help in assessing your practice – Quick Online Overview and action planning
  • JISC Legal eSafety Policy
  • Belt and Braces Approach E-responsibility Digital Values Any Questions
  • Contact DetailsDeborah JudahJISC RSC Yorkshire and HumberTel: 01133431000d.judah@leeds.ac.ukAnita HoltJISC RSC NorthwestTel: 01524 510062ah@rsc-northwest.ac.uk