Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

JISC Legal e-Safety Presentation


Published on

This presentation is aimed at the UK HE and FE sectors on how to safeguard learners, particularly with regard to IT. For more information please see:

Published in: Education
  • Be the first to comment

  • Be the first to like this

JISC Legal e-Safety Presentation

  1. 1. e-Safety and the Law: How to Safeguard Your Learners 19 March 2010
  2. 2. Hello! <ul><li>Jackie Milne JISC Legal Service </li></ul><ul><li>[email_address] </li></ul><ul><li>0141 548 4939 </li></ul><ul><li> </li></ul>
  3. 3.
  4. 4. Safeguarding for Colleges <ul><li>Wider than child protection </li></ul><ul><li>More than safe recruitment </li></ul><ul><li>“ It means having a culture of vigilance where all staff know their responsibilities...and all learners are aware of what they can expect and what to do if they have concerns.” ‘Safer Recruitment and Safeguarding Learners in the FE sector’ workshop handbook 2009 </li></ul>
  5. 5. Background and Ofsted <ul><li>Self Evaluation – 4b </li></ul><ul><li>‘ If a provider is judged inadequate for safeguarding, then it is most likely that they will be judged inadequate for overall effectiveness .’ Ofsted </li></ul><ul><li>“ Children and young people need to be empowered to keep themselves safe ...” Dr Tanya Byron Safer children in a digital world: The report of the Byron Review </li></ul>
  6. 6. Managing Risk <ul><li>RIGHT TO BE, FEEL SAFE </li></ul><ul><li>FREE from victimisation and discrimination </li></ul><ul><li>DUTY OF CARE: take all reasonable steps to ensure ‘safety’ (behaviours and systems) </li></ul>
  7. 7. Some Legal Issues … <ul><li>Sexual Offences </li></ul><ul><li>Obscene publications </li></ul><ul><li>Cyberbullying (Houghton) </li></ul><ul><li>Harassment </li></ul><ul><li>Defamation </li></ul><ul><li>Data Protection & Privacy </li></ul>
  8. 8. “ e-safety” <ul><li>Security (technology) </li></ul><ul><li>Management of Data </li></ul><ul><li>AUP (JANET, NEN) </li></ul><ul><li>Anti bullying policy </li></ul><ul><li>Disciplinary procedures </li></ul><ul><li>Reporting procedure </li></ul>
  9. 9. e-Safety Policy <ul><li>Consultation </li></ul><ul><li>Link with other policies </li></ul><ul><li>Incident recording procedure </li></ul><ul><li>Inclusion in curriculum and training </li></ul><ul><li>Partnerships, agencies, support </li></ul><ul><li>Further information for staff, students </li></ul><ul><li>Review; clear, consistent, proactive </li></ul>
  10. 10. Dealing with incidents <ul><li>Clear guidelines on appropriate response (immediate, proportionate, to whom, follow up) </li></ul><ul><li>Accidental/deliberate </li></ul><ul><li>Inappropriate/illegal (internal, external involvement) </li></ul><ul><li>Response appropriate to incident </li></ul><ul><li>Investigation (AUP, no surprises) </li></ul><ul><li>Sanctions (AUP, disciplinary procedure) </li></ul><ul><li>All incidents and actions recorded </li></ul><ul><li>Joined up response, support </li></ul>
  11. 11. Conclusions <ul><li>Think ahead – who is responsible? </li></ul><ul><li>Formulate and action plan (audit) </li></ul><ul><li>Select a committee to write the policy </li></ul><ul><li>Have linked policies in place </li></ul><ul><li>Establish an incident response procedure </li></ul><ul><li>Raise awareness – training and education </li></ul><ul><li>Know partners and support mechanisms </li></ul><ul><li>Sources for help </li></ul><ul><li>Review/update procedures (learner input) </li></ul>
  12. 12. Your questions [email_address]