Generic e responsiblity presentation for advisors aug-2012
Upcoming SlideShare
Loading in...5

Generic e responsiblity presentation for advisors aug-2012



JISC RSC modular Presentation used to deliver eSafety Offer sessions. See session plans and service catalogue for more detail.

JISC RSC modular Presentation used to deliver eSafety Offer sessions. See session plans and service catalogue for more detail.



Total Views
Views on SlideShare
Embed Views



1 Embed 4 4



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • eSafety covers a wide range of issues but Content Contact and Conduct are the three that cover the issues for ISC’s. Discuss Gaming password security scenario? And should not be seen as a technical problem Young people are technically savvy and enthusiastic but need education around the risks and threats to on and off line life And they are as much as threat to each other than the passive victim It is all about assessing and responding to real risk
  • Why are we worried and what worries you? Write it on the board/chart?   Not easy to say – organisational and professional risk?   Write it on the cards or text it to me   Try to remember which 4 you are most interested in. HOLD those numbers might want to come back to them in a minute Name and email address to get ppt.
  • Maybe Probably – via safeguarding policy What if you were worried about a member of staffs behaviour online? –probably no dilemma if it concerns learners under 16... What is the college policy of facebook friends and groups? How does it sit with encouraging technology and equipping learners with skills for living. Who is responsible and for what when and if things go wrong? Mobile devices,... Personal devices... Does my profile look bad in this...? August 7, 2012
  • Which should you do and which should you not – well we don’t have time to explore so text me you answers - there might be a prize (tease to get them to disclose personal information) Lots of us use facebook or other SN sites. Who should be one? After all what is a FB friend? How does this fit with using FB in education? It’s brilliant for sharing photos and other media – and other personal information - but their are the risks. We are discouraged from sharing passwords and log-ins but encouraged to share pretty much everything else. How do we make theses decisions?
  • There has been a seed change in the way we use technology since web 2. We are uploading, creating and collaborating where we were downloading and consuming.. Digital Native or not ... Young people are routinely using personal devices, phones and games consoles to share their information - not just photos, GPs location – checking into Facebook and places, downloading QR codes to their phones that trigger url’s to websites or download PDF docs. Notice you can check your friends in too.
  • So its the Digitial landscape that is changing...web 1 web 2 and now web 3 We can anticipate a stream of learners challenge our way of doing things and out-skilling us in the use of technology because they are ‘digital natives’ or don’t recognise the dangers If you don’t use face-book and a smart phone you are entitled to be nervous especially as you have got responsibilities in this alien world. We can’t just ignore the massive changes in our day to day lives that technology - you can’t just lock things down as before and hope for the best – a single smart phones can bypass the filtering, and anyway I’m here to encourage you to utilise the benefits of technology in teaching.
  • We are talking: Establishing Digital Values, Controlling Digital Identity, Demonstrating Digital Professionalism, Disseminating Digital skills Learners have to be taught to protect themselves and recognise the effects of their behaviour on each other. They need to learn digital values just like elsewhere in life. If we are giving staff responsibilities then we ought to give them the skills to protect the learners in their care and increasingly their own professional reputation with clear policies on the use of social media and personal devices. Organisations must assess the real risks to their own staff and learners by actually asking them ...again and again as the new technology emerges. Legal requirements and professional standards that apply must be acknowledged and must be monitored and evidenced August 7, 2012
  • Choose a QUIZ or Questions based on topics below or from the ESafety Assessment Resources sheet. QUIZ Passwords: Never write them down – find another way to remember them – KeePass locks all your passwords in a safe – with one password Never share them – it s probably a disciplinary because of data protection and invalidates financial contracts Personal information - photos –tagging friends and auto tagging in face book Respect for your self - Digital Dirt Teenager fired for saying job was boring Ownership – copyright and referencing sticking to terms of use. Not doing things that are illegal. Giving away contact details and then Respect for others – The rules are the same as off line. Is cyberbullying listed in the student code..? Interfering with someone’s wellbeing and ability to study. Test that you know where the line is for appropriate behaviour online. List of quizzes and eSafety assessments to choose from to suit age and issue i.e. A Thin Line Cyberbullying videos, campaigns and ‘sites’ like Formspring and little gossip exist just to dish the dirt - as well as everyday facebook slanging matches. There are any number of videos aimed at fighting cyberbullying and grooming. SMOKESCREEN – based on a social networking site and authored by young people is an education for all of us. ... and then there’s Stalking. I have included this video because it fits in with the idea of digital identity and has a double edged young persons perspective. August 7, 2012
  • What do people know about Facebook privacy etc. Where do you get help? Face book defaults protect users under 18 But not if they tick suggest friends or check me in Facebook has a guide for using FB in Education also see the RSC wiki slide 34 But did you know... Quiz / questions based on facebook privacy settings and data protection / AUP’s i.e. That suggest photos of me to friends uses face recognition to auto-tag you? What is good online behaviour? In online communities? Share your password with someone? Tag a colleague in GPS or SN?
  • Sharing Information Can you recognise a bogus email or other everyday security risk online? This slide is taken from an LSIS resource on the EG. Run through email and phishing section which are about being careful about giving out information – who has it come from and going to? Another example of a bogus email – point out that the web address (1) is different when you hover over the text (2). The next slide will show the issues clearly.
  • Do you ever forward chain emails or threatening emails? Do you report them or do you take a screen grab instead? Did you know Web-bots can read and copy an email address. Use different accounts for different things Google mail, hotmail all free and easy to ditch
  • What are the consequences of giving out too much information? Show video and discuss in context of relevant risk to learners – adults, under 16’s, Vulnerable Learners, residential settings, friends and colleagues
  • Should behaviour online be different to off-line? Why Not? Anonymity/everyone does it/ it’s just for fun/ real life facebook Teenage guruz August 7, 2012
  • How do you appear online? What is your Digital Profile like? Run Video - Respect yourself There are lots of examples designed to put the fighteners on you but the issues are real. You’re having fun and acting on impulse today but what about tomorrow? Digital dirt A real teenager has been sacked for posting that she was bored and teachers have been sacked because of their holiday snaps online.
  • You can check your digital profile and find out who is following you via Google. But this is becoming more and more complex ... beware who’s following you following them, following you...
  • There are even sites that exist just to dish the dirt like formspring and little gossip – as well as everyday (daily) slanging matches on Facebook. Take a look at SMOKESCREEN - based on a social networking site and authored by young people says it all. August 7, 2012
  • Stealing is stealing and creative people don’t usually like you taking their pictures and pay from a gallery so... How do you address Copyright? Observe the Terms of use and illegal downloading – copyright is about to change to reflect the digital age more info from JISC legal? Could you encourage sharing copyright and referencing with creative commons?
  • Handout Scenarios – 10 – 60 minutes Could be on screen or as a group activity – with action planning if appropriate. Add any other relevant scenarios that help to put the points across. i.e. ACL & WBL – what role does a centre manager / have in enforcing an AUP if a tutor doesn’t comply to password security? VL – Setting up an eBay account for a VL? The aim here is to get each to address their own organisations / departments risk and responsibility – you may not have the answer
  • What is the most serious risk?
  • What would you do – Do you have any responsibility to do anything? Legally, morally.....
  • What might be the consequences if Debbie is staff? In the future?
  • Do people know their responsibilities under the Data Protection and Illegal Drug legislation?
  • Many Organisations have a risk assessment process that addresses the Risk to the Organisation, staff and learners. You can start assessing risk with a simple grid. Who are the learners and what are they going to be doing online, how well can the staff supervise or moderate activity?
  • This organisational audit tool is taken from the LSIS eSafety in Safeguarding Facilitators half day course. There is a copy on the eSafety Offer Delivery site
  • Make a direct link between the code requirements and policies and say Cyberbullying
  • For Ofsted - It’s all about assessing risk and evidencing that you have done so through your policies, procedures and practice. Standards and Inspection
  • SWGfL have developed a comprehensive assessment tool with accreditation called 360 degree safe -– mainly for use with schools – and a quick version which lends itself to quick assessment and for smaller organisations called Online Compass - which we have adapted to provide a quick online self audit tool to help you identify priorities and plan your next actions
  • We have created an online survey based on SWGfL 360 degrees and Online Compass which is easy to complete to get a picture of your provision and the changes you need to address.
  • Which feeds the results into this spreadsheet using an red amber green theme, priority areas are identified and with advisor actions are agreed
  • Visit our JISC RSC UK website to find out more about what we offer. Contact your regional eSafety lead
  • JISC RSC Advisors will take you through eSafety from a stragetic perspective using a range of resources brought together into one place with added context for FE & Skills sector: JISC RSC e-Safety Resource wiki. Including sector specific advice and support from JISC legal and JISC TechDis. You can search for links to useful documents such as the JISC Legal eSafety Policy checklist ( ) or Policy Template. You RSC advisor will help get you started.
  • View the JISC legal eSafety Policy Checklist Complete the JISC Legal eSafety Template

Generic e responsiblity presentation for advisors aug-2012 Generic e responsiblity presentation for advisors aug-2012 Presentation Transcript

  • E-responsibilityEncouraging digital values and responsible behaviour online
  • What are the Issues?• Content they access & post online• Who they contact and who they allow to contact them• How they conduct themselves online, eg, cyberbullying; sexting; pro-harm sites, etc• Digital Identity – Now and in the future
  • Why are you worried?1. Safeguarding is a Limiting Grade at Ofsted2. Worried about Learners online behaviour3. Staff skills don’t match learner savvy4. Already got a problem with Social Networking5. Worried you might get sued6. Unclear advice on risk and responsibility7. Use of personal devices to bypass filtering8. Your own Professional/Digital Reputation
  • Do you need to know...1. What Ofsted want to see?2. How to report your worries?3. Where to get relevant up to date training?4. How to use facebook safely?5. What your responsibilities are?6. Where to get legal and professional advice?7. How to use new technology safely?8. Your digital profile?Go to View > Header & Footer August 7, 2012 | slide 4to edit
  • Do’s and Don’ts1. “Friend” learners on Facebook or SN sites2. “Friend” colleagues on Facebook or SN sites3. Share email address with learners4. Set up accounts for vulnerable people5. Forward photos to friends or learners6. Check-in your location on-line 07525770552 TXT: Digi-DONT.7. Disclose a password or log-in Your Name. Your Details8. Share personal information
  • What’s not good practice07525770552TXT: Digi-ID.Your Name.Your worry
  • Natives in a Digital Landscape Adults? Young people? ICT Web 2-3 – Download –Uploading – Consume –Creating and collaborating – Corporate –Personalising– Separate media –Converged media – Static –Interacting communities –Responsive: QR codes, GPS locations
  • Web 2 and 3 Adults? Young people? ICT Web 2-3 – Download – Upload – Consume – Create – Corporate – Personalise– Separate media – Converged media – Static – Interactive
  • eResponsibilityIn the post-16 sector online safety must be a two-way processeResponsibility - Learners need digital values to protect themselves and each other online Staff need the skills to protect their learners and guidance for their own professional reputation Organisations must re-assess the real risks to their own staff and learners through consultation Legal requirements and professional standards apply and must be evidenced and monitoredGo to View > Header & Footer August 7, 2012 | slide 9to edit
  • Digital ValuesProtecting yourself and others online• Strong passwords and security awareness• Cautious information sharing – everyone’s• Respect for yourself protect your profile• Ownership – copyright and referencing• Care with web forms txt messages and emails• Respect for others in online communitiesHow would you ‘Do’? Choose a QUIZGo to View > Header & Footer August 7, 2012 | slide 10to edit
  • Facebook for educators
  • Another bogus email..
  • • Do you use email accounts cleverly or do you ‘post’ them for web-bots to find?email@*SPAM*juliataylor.comemail@~deletethis~juliataylor.comemail[at] juliataylor [dot] com
  • Go to View > Header & August 7, 2012 | slide 15Footer to edit
  • What is Your Digital Identity?
  • Go to View > Header & Footer August 7, 2012 | slide 17to edit
  • eSafety Risk Scenarios• What level of risk?• How would you know?• What action would you take?• Who would need to be involved?• What are the risks?• Are some at greater risk?• Could this scenario escalate?
  • eSafety Risk Scenarios1. A student has a pornographic image on his screen. He says the “image just appeared and it’s the first time it’s happened”. 2. A member of staff has their password on a post-it note that is clearly visible. 3. A student has posted some unpleasant things about a member of staff on their student Blog. Other students are now talking about it.
  • eSafety Scenarios11. Jane is doing some research for her travel & tourism project on Thailand in the learning resources centre. By accident she comes across some images that make her feel uncomfortable and embarrassed.13. Kirsten a mature student with barriers to learning has been sent a text message during class to her mobile. It says ...”We h8 u. We r going 2 gt u l8r”14. Alex is using the internet in the open learning area, to sign up to a new site ... he will have to enter personal details
  • eSafety Scenarios15. Debbie’s friend has set up a Facebook page but is unaware of the options for changing privacy settings. There are some (tagged) photos of Debbie on the site. 16. A loaned-out laptop which can be used by staff and visiting speakers is sent for repair. Images of hardcore pornography are found in the temporary files folder. 4. A member of staff has taken home student data in Excel format on a memory stick.
  • eSafety Scenarios24. A USB Stick has been found by a staff member. The owner is unknown but the USB contains inappropriate images of young girls – none of whom he recognises. 16. A member of staff mentions they could win a camera by clicking a link in an email that says “ your details have been safely received”17. A student shows a staff member a Blog which he says is used by young people to get drugs.
  • Risk Assessment
  • Safeguarding and ICT• Safety issues are the same as offline• What are the real risks• Link eResponsibility with learner code – Making learning successful for everyone – Play an active part in equality and diversity – Reporting inappropriate behaviour • Threats, racism, disrespect, disruption, damage to college.
  • Ofsted Requirementsshow a clear requirement to keep learners safe when using technology in the organisational settingthe importance of equipping learners with the skills and knowledge to keep themselves safe whenever and wherever they go onlineHow are you going to demonstrate it?Standards and Inspection
  • Key Steps In Esafety• Think eResponsibility! -Digital Skills & Values• SMT backing – across the whole organisation• Assess your current practice• Integrate eSafety into Organisational Policy• Get learners involved- induction and feedback• Clearly define roles in the reporting process• Get Advice from JISC
  • JISC RSC ‘s Esafety Offer• Awareness Workshops – – eResponsible behaviour and Digital Values• Strategic consultations on key steps – Key Steps, Policy and procedures• Staff Development – Sector Specific, legal and technical requirements• Help in assessing your practice – Quick Online Overview and action planning
  • JISC Legal eSafety Policy
  • Contact details