SlideShare a Scribd company logo
1 of 9
Download to read offline
1 of 9
e-SAFETY POLICY AND
PROCEDURE
Effective for applicants, employees, volunteers, governors, potential
students and students on or after 14 January 2013
2 of 9
e-SAFETY POLICY AND PROCEDURE
SECTION PAGE
1. BACKGROUND 3
2. DEFINITIONS 3
3. SCOPE 3
4. INTENT 4
5. RESPONSIBILITIES 4
6. POLICY STATEMENTS 5
7. OTHER RELEVANT POLICIES 7
8. REVIEW 7
APPENDICES
Appendix 1 Flowchart of e-Safety incident 8
Appendix 2 The misuse of College systems 9
3 of 9
e-SAFETY POLICY AND PROCEDURE
1. BACKGROUND
1.1 The internet, social and other online media, and the rise of mobile devices able
to access such media, are powerful tools, which provide opportunities for
everyone. However, the use of these can also put people at risk within and
outside the College, particularly young and vulnerable people. We aim to
practice and promote safe use of these technologies.
1.2 The risks young people may be exposed to may include, but are by no means
restricted to:
 Access to illegal, harmful or inappropriate images or other content
 Un-authorized access to, and use of, personal information
 The risk of being subject to grooming by strangers via social media sites.
 Inappropriate contact with others, including strangers
 The sharing of personal images without an individual's consent or knowledge
or understanding of the risks involved
 Digital information remaining accessible and / or shared even after an
individual believes it has been deleted, and the consequences of this. For
example, an inappropriate image of a young person being discovered 5 years
later by an employer to whom the young person has applied for a job
 Cyber-bullying
 An inability to evaluate the quality, accuracy and relevance of information on
the internet
 Plagiarism, copyright infringement, illegal downloading of music or video files
 The potential for excessive use which may impact on the social and emotional
development and learning of a young person.
2. DEFINITIONS
 Social media – online sites for social interaction such as Facebook and Twitter
 Mobile devices – smartphones, tablet computers and laptops
 Children and young people – those aged under 18 years
 Vulnerable adults – those aged over 18 who may be considered vulnerable to
abuse, for example those with learning difficulties or disability
3. SCOPE
3.1 The e-Safety Policy applies to all College staff, students and contracted staff,
whether they work or study in the main College campuses, outreach centres or
other designated areas, volunteers and governors.
3.2 The policy applies to students on work experience and work placement
programmes and those engaged in any College-organised off site activity.
3.3 The policy applies to working arrangements with other agencies to support the
College’s e-Safety Policy, including local education authorities, schools,
support agencies, sub-contractors and employers.
4 of 9
4. INTENT
The intent of the e-Safety Policy is to ensure that:
4.1 The College’s own IT systems are sufficiently resilient to protect users from
others accessing their personal data, and to prevent them from accessing
inappropriate sexualised, violent or offensive material.
4.2 Staff are aware of the risks to young and vulnerable people posed by
technology
4.3 College students are supported to enable them to gain the benefits of
technology while protecting them from the risks involved.
4.4 The possibility of illegal online activity, including for example cyber-bullying,
the illegal downloading of copyright material, fraud, identity theft, is reduced.
5. RESPONSIBILITIES
5.1 e-Safety Lead (Head of Student Services)
 takes day to day responsibility for e-Safety issues and has a leading role in
establishing and reviewing the College e-Safety and Safeguarding policies.
 ensures that all staff are aware of the procedures that need to be followed in
the event of an e-Safety incident taking place
 ensures that training and advice are provided for staff, students, parents /
carers and others
 Represents the College and where necessary, the sector, and keeps
professionally up to date, through participation in LSCB and Somerset
Colleges Safeguarding Committee meetings
5.2 Designated Safeguarding Officers
 Support and advise students and staff in their area of the College on e-Safety
matters
 Deliver e-Safety Tutorials (for students) and training (for staff)
 Keep professionally aware and up to date on e-Safety matters through regular
in house and external training
5.2 The Head of IT Services ensures that:
 the College’s IT infrastructure is secure and is not open to misuse or malicious
attack
 the College has a filtering procedure which is updated on a regular basis and
misuse of systems can be detected and referred to the Head of Student
Services. The filtering procedure should be able to be lifted on request for
specific resources needed for genuine curriculum purposes, but only for the
period of study.
 IT staff are up to date with relevant technical information in order to ensure
network security and protection for users
5.3 Teaching and Support Staff are responsible for ensuring that:
 they have an up to date awareness of e-Safety matters and of current College
e-Safety policy and practices
5 of 9
 they have read, understood and accept the College IT User Code of Practice
when they log on to the network
 they report any suspected misuse or problem to a Safeguarding Officer or
Head of Student Services.
 all communications with students are carried out at a professional level – for
example, they do not make ‘friends’ with students on personal social
networking sites.
 e-Safety issues are embedded in all aspects of the curriculum and other
College activities
 students are supported to develop research skills and avoid plagiarism and
uphold copyright regulations.
6 Policy statements
6.1 Staff guidelines for dealing with an e-Safety incident
When it becomes apparent that a young or vulnerable person has been the victim of
bullying or harm through online activity and technology, the following steps should be
taken:
 Ensure the young or vulnerable person is safe and no longer at risk of harm
 Check that others are not at immediate risk of harm from the same e-Safety
issue
 Contact the Safeguarding Officer for your Area of the College
 Cooperate with the Safeguarding Officer, IT Services or Police investigation as
required.
 Talk to your line manager if you feel in need of support following exposure to
the incident.
 Consider what you and other staff can learn from the experience to reduce
such incidents in future.
6.2 Education and training
Students
e-Safety education will be provided in the following ways:
 e-Safety awareness training will be offered via the Tutorial programme. This
should aim to help students to understand and adopt safe and appropriate use
of IT, the internet and mobile devices both within and outside College
 Students will be encouraged to be critically aware of content they access on-
line and be helped to validate the accuracy of information
 Students should be taught to acknowledge the source of information used and
to respect copyright when using material accessed on the internet
 Rules for use of IT systems will be accessible to students, for example on login
screens
Parents / carers
Many parents and carers have a limited understanding of e-Safety risks and issues,
despite the amount of time that young people spend online. The College will therefore
seek to provide information and enhance awareness for parents, for example by
offering drop in sessions on e-Safety at Parents’ Evenings.
Staff
6 of 9
e-Safety training will be offered:
 As a planned programme of formal e-Safety training.
 As part of the initial safeguarding training undertaken by all staff
 In addition other opportunities should be sought to enhance staff awareness of
e-safety, for example via newsletters and meetings
Governors
Opportunities should be sought to brief Governors on e-safety.
6.3 Social Networking
The College’s policy on the use of social media sites is that:
 The College accepts that students will wish to access social media sites and
appropriate access will, where possible, be provided in College. However the
College will reserve the right to limit access where this prevents others from
using IT facilities for study purposes.
 Students will be warned of the dangers implicit in the use of social media, such
as making ‘friends’ with strangers and the risks of grooming.
 Staff will be supported in understanding the privacy settings on Social
Networking sites and using these to help avoid potential allegations.
 Staff will be told explicitly that they must not make ‘friends’ with students on
personal social media sites. Where contact is made via a social media site for
marketing, curriculum, alumni or other non-personal reasons, a corporate,
rather than personal, social media site must be created and used for such
purposes.
6.4 E-mail and text messages
 Email services for staff and students will be made as safe and secure as
possible, and the security of these services monitored regularly.
 Users must immediately report, to the nominated person and in accordance
with the College policy, the receipt of any email or text that makes them feel
uncomfortable, is offensive, threatening or bullying in nature and must not
respond to any such email.
 Any digital communication between staff and students or parents/carers must
be professional in tone and content. Personal email addresses or mobile
numbers must not be used for email and text communication with students.
 Opportunities will be sought to teach students about email safety issues, such
as the risks attached to the use of personal details. They should also be taught
strategies to deal with inappropriate emails and be reminded of the need to
write emails clearly and correctly and not include any unsuitable or abusive
material.
6.5 Use of digital images and video
Staff and students need to be aware of the risks associated with sharing images and
with posting digital images on the internet. Those images may remain available on the
internet forever and may cause harm or embarrassment to individuals in the short or
longer term.
 When using digital images, opportunities should be sought to educate students
about the risks associated with the taking, use, sharing, publication and
distribution of images, in particular via social networking sites.
7 of 9
 Students must not take, use, share, publish or distribute images of others
without their permission.
 Photographs and videos of students published on the College website, or in
printed media, or taken for assessment purposes or as record of performance,
will be selected carefully and will comply with good practice guidance on the
use of such images. Where practicable written permission from students will
be sought, and from parents or carers when photographs of students under 18
are published. Care should be taken when taking images that students are
appropriately dressed and are not participating in activities that might bring the
risk of harm to individuals or bring the College into disrepute
6.6 Data Protection
Personal data will be handled according to the Data Protection Act 1998 which states
that personal data must be:
 Fairly and lawfully processed
 Processed for limited purposes
 Adequate, relevant and not excessive
 Accurate
 Not kept longer than necessary
 Processed in accordance with the data subject's rights
 Secure
 Nor transferred to others without adequate protection
At all times, care has to be taken to ensure the safe keeping of personal data,
minimising the risk of its loss or misuse. Personal data should only be used on secure
password protected computers and other devices, ensuring that staff are properly
logged out at the end of any session in which they are using personal data. Data
should only be transferred using encryption and/or secure password protected
devices.
7 Other relevant policies
This policy should not be read in isolation but should be cross-referenced to other
relevant College employment and student policies and procedures, including:
 Safeguarding and Child Protection Policy and Procedure
 IT Users Code of Conduct
 Mobile Device Policy and Procedure
 CRB, ISA and Rehabilitation of Offenders Policy
 Staff and Student Disciplinary Policies and Procedures
 Data Protection Policy and Procedure
8 Review
This policy will be reviewed every three years, or earlier where new technological
developments suggest revision is necessary.
8 of 9
Appendix 1
What to do in the event of discovering an e-Safety incident (see Section 6.1)
College staff suspect
e-Safety issue/problem
Report to Safeguarding
Officer
Illegal activity
Head of IT Services
report and liaison
Breach of College rules
on E-Safety
Report to Police Disciplinary
9 of 9
Appendix 2 The misuse of College systems
Inappropriate online activities
Users of College IT systems should not engage in the online activities below, but this
list is not exhaustive:
 Any online activities that would be considered illegal
 Viewing or uploading of pornography or adult material
 Promotion of any kind of discrimination
 Threatening behavior including promotion of physical violence or mental harm
 any other information which may be offensive to colleagues, breaches the
integrity of the ethos of the College, or brings the College into disrepute
 Use of College systems to run a private business
 Use of mechanisms that bypass the filtering or other safeguards employed by
the college
 Downloading or installation of commercial software or copyrighted material
without the necessary licensing permissions
 Revealing or publicising confidential or proprietary information (e.g. financial /
personal information, databases, computer / network access codes and
passwords)
 Creating or propagating computer viruses or other harmful files
 Carrying out sustained or instantaneous high volume network traffic that
causes network congestion and hinders others in their use of the internet.
 On-line gaming and gambling
 File sharing
Action in the event of misuse of ICT
All members of the College community are expected to be responsible users of ICT
who follow the requirements of this policy. However, there may be times when
infringements of the policy could take place through careless or deliberate misuse.
Students discovered to be engaged in activities such as those listed above are subject
to the Student Disciplinary Procedure. Staff will be subject to the Staff Disciplinary
Procedure. The Head of IT Services should be alerted to the nature of the activity to
ensure that changes to the system can be restored and any unauthorised activity or
software can be removed.

More Related Content

What's hot

Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523cinkay
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use PolicyBarb Jansen
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Tech coderevised8 17-5
Tech coderevised8 17-5Tech coderevised8 17-5
Tech coderevised8 17-5juliamaguire29
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 

What's hot (18)

Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
A2 s watson etl523
A2 s watson etl523A2 s watson etl523
A2 s watson etl523
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Computer Acceptable Use Policy
Computer Acceptable Use PolicyComputer Acceptable Use Policy
Computer Acceptable Use Policy
 
E-Safety
E-SafetyE-Safety
E-Safety
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Ch.8[1]
Ch.8[1]Ch.8[1]
Ch.8[1]
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Tech coderevised8 17-5
Tech coderevised8 17-5Tech coderevised8 17-5
Tech coderevised8 17-5
 
Ofsted & E Safety Show Dormat
Ofsted & E Safety Show DormatOfsted & E Safety Show Dormat
Ofsted & E Safety Show Dormat
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 

Viewers also liked

Bowstring Bridges Project
Bowstring Bridges ProjectBowstring Bridges Project
Bowstring Bridges ProjectKevin Molloy
 
Runlite 38mm Filament LED LM-80 test report.PDF
Runlite  38mm Filament LED  LM-80 test report.PDFRunlite  38mm Filament LED  LM-80 test report.PDF
Runlite 38mm Filament LED LM-80 test report.PDFNancy Yu
 
Kevin Molloy poster
Kevin Molloy posterKevin Molloy poster
Kevin Molloy posterKevin Molloy
 
Use of a defensive handgun minnesota statutes
Use of a defensive handgun   minnesota statutesUse of a defensive handgun   minnesota statutes
Use of a defensive handgun minnesota statutesaegis outdoors
 
Iman kepada rasul (eli fitriani)
Iman kepada rasul (eli fitriani)Iman kepada rasul (eli fitriani)
Iman kepada rasul (eli fitriani)Amalia Sofitri
 
Iman kepada kitab kitab allah (nisrokhah)
Iman kepada kitab kitab allah (nisrokhah)Iman kepada kitab kitab allah (nisrokhah)
Iman kepada kitab kitab allah (nisrokhah)Amalia Sofitri
 
Brandia Design Agency in vietnam -Profile 2014
Brandia Design Agency in vietnam -Profile 2014Brandia Design Agency in vietnam -Profile 2014
Brandia Design Agency in vietnam -Profile 2014Ng. Tùng
 
Materi meneladani kemuliaan dan kejujuran para rasul allah swt
Materi meneladani kemuliaan dan kejujuran para rasul allah swtMateri meneladani kemuliaan dan kejujuran para rasul allah swt
Materi meneladani kemuliaan dan kejujuran para rasul allah swtyukbelajar
 
집단지성 시대가 요구하는 공부
집단지성 시대가 요구하는 공부집단지성 시대가 요구하는 공부
집단지성 시대가 요구하는 공부cbs15min
 
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016Burton Lee
 
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016Burton Lee
 

Viewers also liked (17)

Bowstring Bridges Project
Bowstring Bridges ProjectBowstring Bridges Project
Bowstring Bridges Project
 
Runlite 38mm Filament LED LM-80 test report.PDF
Runlite  38mm Filament LED  LM-80 test report.PDFRunlite  38mm Filament LED  LM-80 test report.PDF
Runlite 38mm Filament LED LM-80 test report.PDF
 
Kevin Molloy poster
Kevin Molloy posterKevin Molloy poster
Kevin Molloy poster
 
PROFESSIONAL RESUME
PROFESSIONAL RESUMEPROFESSIONAL RESUME
PROFESSIONAL RESUME
 
SPWLA-1986-vXXVIIn3a2
SPWLA-1986-vXXVIIn3a2SPWLA-1986-vXXVIIn3a2
SPWLA-1986-vXXVIIn3a2
 
Use of a defensive handgun minnesota statutes
Use of a defensive handgun   minnesota statutesUse of a defensive handgun   minnesota statutes
Use of a defensive handgun minnesota statutes
 
Iman kepada rasul (eli fitriani)
Iman kepada rasul (eli fitriani)Iman kepada rasul (eli fitriani)
Iman kepada rasul (eli fitriani)
 
Parapaulixv
ParapaulixvParapaulixv
Parapaulixv
 
DR JITENDRA BALESA CV
DR JITENDRA BALESA CVDR JITENDRA BALESA CV
DR JITENDRA BALESA CV
 
Perpan i uas 2014 038
Perpan i uas 2014 038Perpan i uas 2014 038
Perpan i uas 2014 038
 
Kitab kitab allah
Kitab kitab allahKitab kitab allah
Kitab kitab allah
 
Iman kepada kitab kitab allah (nisrokhah)
Iman kepada kitab kitab allah (nisrokhah)Iman kepada kitab kitab allah (nisrokhah)
Iman kepada kitab kitab allah (nisrokhah)
 
Brandia Design Agency in vietnam -Profile 2014
Brandia Design Agency in vietnam -Profile 2014Brandia Design Agency in vietnam -Profile 2014
Brandia Design Agency in vietnam -Profile 2014
 
Materi meneladani kemuliaan dan kejujuran para rasul allah swt
Materi meneladani kemuliaan dan kejujuran para rasul allah swtMateri meneladani kemuliaan dan kejujuran para rasul allah swt
Materi meneladani kemuliaan dan kejujuran para rasul allah swt
 
집단지성 시대가 요구하는 공부
집단지성 시대가 요구하는 공부집단지성 시대가 요구하는 공부
집단지성 시대가 요구하는 공부
 
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016
Michael Asshauer - FAMILO - DE - Stanford Engineering - Mar 7 2016
 
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016
Harm Botter - ExxFire - NL - Stanford Engineering - Mar 7 2016
 

Similar to eSafety policy

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.moeenali5423
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'JISC RSC Eastern
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxZaideMangondato1
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docxdickonsondorris
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Assignment Help
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014Rebecca Avery
 

Similar to eSafety policy (20)

JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
E safety presentation staff workshop
E safety presentation staff workshopE safety presentation staff workshop
E safety presentation staff workshop
 
E Safety For Governors
E Safety For GovernorsE Safety For Governors
E Safety For Governors
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
Resources
ResourcesResources
Resources
 
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docxUNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY  Acceptable Use.docx
UNIVERSITY OF HOUSTON, COLLEGE OF TECHNOLOGY Acceptable Use.docx
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
E safety inset
E safety insetE safety inset
E safety inset
 

More from bwcelearning

FdSc Countryside Management
FdSc Countryside ManagementFdSc Countryside Management
FdSc Countryside Managementbwcelearning
 
HE Terms and Conditions 2015 16
HE Terms and Conditions 2015 16HE Terms and Conditions 2015 16
HE Terms and Conditions 2015 16bwcelearning
 
Student Conduct and Disciplinary Procedure
Student Conduct and Disciplinary ProcedureStudent Conduct and Disciplinary Procedure
Student Conduct and Disciplinary Procedurebwcelearning
 
Foundation Degree in Motorsport Engineering
Foundation Degree in Motorsport EngineeringFoundation Degree in Motorsport Engineering
Foundation Degree in Motorsport Engineeringbwcelearning
 
FdA Media Production
FdA Media ProductionFdA Media Production
FdA Media Productionbwcelearning
 
BSc Applied Computing
BSc Applied ComputingBSc Applied Computing
BSc Applied Computingbwcelearning
 
FdSc Sport Science with Sports Coaching Education
FdSc Sport Science with Sports Coaching EducationFdSc Sport Science with Sports Coaching Education
FdSc Sport Science with Sports Coaching Educationbwcelearning
 
FdSc Mechanical Engineering
FdSc Mechanical EngineeringFdSc Mechanical Engineering
FdSc Mechanical Engineeringbwcelearning
 
FdSc Mechanical Engineering
FdSc Mechanical EngineeringFdSc Mechanical Engineering
FdSc Mechanical Engineeringbwcelearning
 
FdSc Applied Animal Management
FdSc Applied Animal ManagementFdSc Applied Animal Management
FdSc Applied Animal Managementbwcelearning
 
FdSc Animal Conservation
FdSc Animal ConservationFdSc Animal Conservation
FdSc Animal Conservationbwcelearning
 
BSc Animal Conservation
BSc Animal ConservationBSc Animal Conservation
BSc Animal Conservationbwcelearning
 
BSc Applied Animal Management
BSc Applied Animal ManagementBSc Applied Animal Management
BSc Applied Animal Managementbwcelearning
 
HE Student opportunities
HE Student opportunitiesHE Student opportunities
HE Student opportunitiesbwcelearning
 
HNC Production Engineering
HNC Production EngineeringHNC Production Engineering
HNC Production Engineeringbwcelearning
 
HNC Mechanical Engineering
HNC Mechanical EngineeringHNC Mechanical Engineering
HNC Mechanical Engineeringbwcelearning
 

More from bwcelearning (20)

HND Computing
HND ComputingHND Computing
HND Computing
 
FdSc Countryside Management
FdSc Countryside ManagementFdSc Countryside Management
FdSc Countryside Management
 
HE Terms and Conditions 2015 16
HE Terms and Conditions 2015 16HE Terms and Conditions 2015 16
HE Terms and Conditions 2015 16
 
Student Conduct and Disciplinary Procedure
Student Conduct and Disciplinary ProcedureStudent Conduct and Disciplinary Procedure
Student Conduct and Disciplinary Procedure
 
HE Welcome
HE WelcomeHE Welcome
HE Welcome
 
HE Journey
HE JourneyHE Journey
HE Journey
 
Campus maps
Campus mapsCampus maps
Campus maps
 
Foundation Degree in Motorsport Engineering
Foundation Degree in Motorsport EngineeringFoundation Degree in Motorsport Engineering
Foundation Degree in Motorsport Engineering
 
FdA Media Production
FdA Media ProductionFdA Media Production
FdA Media Production
 
BSc Applied Computing
BSc Applied ComputingBSc Applied Computing
BSc Applied Computing
 
FdSc Sport Science with Sports Coaching Education
FdSc Sport Science with Sports Coaching EducationFdSc Sport Science with Sports Coaching Education
FdSc Sport Science with Sports Coaching Education
 
FdSc Mechanical Engineering
FdSc Mechanical EngineeringFdSc Mechanical Engineering
FdSc Mechanical Engineering
 
FdSc Mechanical Engineering
FdSc Mechanical EngineeringFdSc Mechanical Engineering
FdSc Mechanical Engineering
 
FdSc Applied Animal Management
FdSc Applied Animal ManagementFdSc Applied Animal Management
FdSc Applied Animal Management
 
FdSc Animal Conservation
FdSc Animal ConservationFdSc Animal Conservation
FdSc Animal Conservation
 
BSc Animal Conservation
BSc Animal ConservationBSc Animal Conservation
BSc Animal Conservation
 
BSc Applied Animal Management
BSc Applied Animal ManagementBSc Applied Animal Management
BSc Applied Animal Management
 
HE Student opportunities
HE Student opportunitiesHE Student opportunities
HE Student opportunities
 
HNC Production Engineering
HNC Production EngineeringHNC Production Engineering
HNC Production Engineering
 
HNC Mechanical Engineering
HNC Mechanical EngineeringHNC Mechanical Engineering
HNC Mechanical Engineering
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

eSafety policy

  • 1. 1 of 9 e-SAFETY POLICY AND PROCEDURE Effective for applicants, employees, volunteers, governors, potential students and students on or after 14 January 2013
  • 2. 2 of 9 e-SAFETY POLICY AND PROCEDURE SECTION PAGE 1. BACKGROUND 3 2. DEFINITIONS 3 3. SCOPE 3 4. INTENT 4 5. RESPONSIBILITIES 4 6. POLICY STATEMENTS 5 7. OTHER RELEVANT POLICIES 7 8. REVIEW 7 APPENDICES Appendix 1 Flowchart of e-Safety incident 8 Appendix 2 The misuse of College systems 9
  • 3. 3 of 9 e-SAFETY POLICY AND PROCEDURE 1. BACKGROUND 1.1 The internet, social and other online media, and the rise of mobile devices able to access such media, are powerful tools, which provide opportunities for everyone. However, the use of these can also put people at risk within and outside the College, particularly young and vulnerable people. We aim to practice and promote safe use of these technologies. 1.2 The risks young people may be exposed to may include, but are by no means restricted to:  Access to illegal, harmful or inappropriate images or other content  Un-authorized access to, and use of, personal information  The risk of being subject to grooming by strangers via social media sites.  Inappropriate contact with others, including strangers  The sharing of personal images without an individual's consent or knowledge or understanding of the risks involved  Digital information remaining accessible and / or shared even after an individual believes it has been deleted, and the consequences of this. For example, an inappropriate image of a young person being discovered 5 years later by an employer to whom the young person has applied for a job  Cyber-bullying  An inability to evaluate the quality, accuracy and relevance of information on the internet  Plagiarism, copyright infringement, illegal downloading of music or video files  The potential for excessive use which may impact on the social and emotional development and learning of a young person. 2. DEFINITIONS  Social media – online sites for social interaction such as Facebook and Twitter  Mobile devices – smartphones, tablet computers and laptops  Children and young people – those aged under 18 years  Vulnerable adults – those aged over 18 who may be considered vulnerable to abuse, for example those with learning difficulties or disability 3. SCOPE 3.1 The e-Safety Policy applies to all College staff, students and contracted staff, whether they work or study in the main College campuses, outreach centres or other designated areas, volunteers and governors. 3.2 The policy applies to students on work experience and work placement programmes and those engaged in any College-organised off site activity. 3.3 The policy applies to working arrangements with other agencies to support the College’s e-Safety Policy, including local education authorities, schools, support agencies, sub-contractors and employers.
  • 4. 4 of 9 4. INTENT The intent of the e-Safety Policy is to ensure that: 4.1 The College’s own IT systems are sufficiently resilient to protect users from others accessing their personal data, and to prevent them from accessing inappropriate sexualised, violent or offensive material. 4.2 Staff are aware of the risks to young and vulnerable people posed by technology 4.3 College students are supported to enable them to gain the benefits of technology while protecting them from the risks involved. 4.4 The possibility of illegal online activity, including for example cyber-bullying, the illegal downloading of copyright material, fraud, identity theft, is reduced. 5. RESPONSIBILITIES 5.1 e-Safety Lead (Head of Student Services)  takes day to day responsibility for e-Safety issues and has a leading role in establishing and reviewing the College e-Safety and Safeguarding policies.  ensures that all staff are aware of the procedures that need to be followed in the event of an e-Safety incident taking place  ensures that training and advice are provided for staff, students, parents / carers and others  Represents the College and where necessary, the sector, and keeps professionally up to date, through participation in LSCB and Somerset Colleges Safeguarding Committee meetings 5.2 Designated Safeguarding Officers  Support and advise students and staff in their area of the College on e-Safety matters  Deliver e-Safety Tutorials (for students) and training (for staff)  Keep professionally aware and up to date on e-Safety matters through regular in house and external training 5.2 The Head of IT Services ensures that:  the College’s IT infrastructure is secure and is not open to misuse or malicious attack  the College has a filtering procedure which is updated on a regular basis and misuse of systems can be detected and referred to the Head of Student Services. The filtering procedure should be able to be lifted on request for specific resources needed for genuine curriculum purposes, but only for the period of study.  IT staff are up to date with relevant technical information in order to ensure network security and protection for users 5.3 Teaching and Support Staff are responsible for ensuring that:  they have an up to date awareness of e-Safety matters and of current College e-Safety policy and practices
  • 5. 5 of 9  they have read, understood and accept the College IT User Code of Practice when they log on to the network  they report any suspected misuse or problem to a Safeguarding Officer or Head of Student Services.  all communications with students are carried out at a professional level – for example, they do not make ‘friends’ with students on personal social networking sites.  e-Safety issues are embedded in all aspects of the curriculum and other College activities  students are supported to develop research skills and avoid plagiarism and uphold copyright regulations. 6 Policy statements 6.1 Staff guidelines for dealing with an e-Safety incident When it becomes apparent that a young or vulnerable person has been the victim of bullying or harm through online activity and technology, the following steps should be taken:  Ensure the young or vulnerable person is safe and no longer at risk of harm  Check that others are not at immediate risk of harm from the same e-Safety issue  Contact the Safeguarding Officer for your Area of the College  Cooperate with the Safeguarding Officer, IT Services or Police investigation as required.  Talk to your line manager if you feel in need of support following exposure to the incident.  Consider what you and other staff can learn from the experience to reduce such incidents in future. 6.2 Education and training Students e-Safety education will be provided in the following ways:  e-Safety awareness training will be offered via the Tutorial programme. This should aim to help students to understand and adopt safe and appropriate use of IT, the internet and mobile devices both within and outside College  Students will be encouraged to be critically aware of content they access on- line and be helped to validate the accuracy of information  Students should be taught to acknowledge the source of information used and to respect copyright when using material accessed on the internet  Rules for use of IT systems will be accessible to students, for example on login screens Parents / carers Many parents and carers have a limited understanding of e-Safety risks and issues, despite the amount of time that young people spend online. The College will therefore seek to provide information and enhance awareness for parents, for example by offering drop in sessions on e-Safety at Parents’ Evenings. Staff
  • 6. 6 of 9 e-Safety training will be offered:  As a planned programme of formal e-Safety training.  As part of the initial safeguarding training undertaken by all staff  In addition other opportunities should be sought to enhance staff awareness of e-safety, for example via newsletters and meetings Governors Opportunities should be sought to brief Governors on e-safety. 6.3 Social Networking The College’s policy on the use of social media sites is that:  The College accepts that students will wish to access social media sites and appropriate access will, where possible, be provided in College. However the College will reserve the right to limit access where this prevents others from using IT facilities for study purposes.  Students will be warned of the dangers implicit in the use of social media, such as making ‘friends’ with strangers and the risks of grooming.  Staff will be supported in understanding the privacy settings on Social Networking sites and using these to help avoid potential allegations.  Staff will be told explicitly that they must not make ‘friends’ with students on personal social media sites. Where contact is made via a social media site for marketing, curriculum, alumni or other non-personal reasons, a corporate, rather than personal, social media site must be created and used for such purposes. 6.4 E-mail and text messages  Email services for staff and students will be made as safe and secure as possible, and the security of these services monitored regularly.  Users must immediately report, to the nominated person and in accordance with the College policy, the receipt of any email or text that makes them feel uncomfortable, is offensive, threatening or bullying in nature and must not respond to any such email.  Any digital communication between staff and students or parents/carers must be professional in tone and content. Personal email addresses or mobile numbers must not be used for email and text communication with students.  Opportunities will be sought to teach students about email safety issues, such as the risks attached to the use of personal details. They should also be taught strategies to deal with inappropriate emails and be reminded of the need to write emails clearly and correctly and not include any unsuitable or abusive material. 6.5 Use of digital images and video Staff and students need to be aware of the risks associated with sharing images and with posting digital images on the internet. Those images may remain available on the internet forever and may cause harm or embarrassment to individuals in the short or longer term.  When using digital images, opportunities should be sought to educate students about the risks associated with the taking, use, sharing, publication and distribution of images, in particular via social networking sites.
  • 7. 7 of 9  Students must not take, use, share, publish or distribute images of others without their permission.  Photographs and videos of students published on the College website, or in printed media, or taken for assessment purposes or as record of performance, will be selected carefully and will comply with good practice guidance on the use of such images. Where practicable written permission from students will be sought, and from parents or carers when photographs of students under 18 are published. Care should be taken when taking images that students are appropriately dressed and are not participating in activities that might bring the risk of harm to individuals or bring the College into disrepute 6.6 Data Protection Personal data will be handled according to the Data Protection Act 1998 which states that personal data must be:  Fairly and lawfully processed  Processed for limited purposes  Adequate, relevant and not excessive  Accurate  Not kept longer than necessary  Processed in accordance with the data subject's rights  Secure  Nor transferred to others without adequate protection At all times, care has to be taken to ensure the safe keeping of personal data, minimising the risk of its loss or misuse. Personal data should only be used on secure password protected computers and other devices, ensuring that staff are properly logged out at the end of any session in which they are using personal data. Data should only be transferred using encryption and/or secure password protected devices. 7 Other relevant policies This policy should not be read in isolation but should be cross-referenced to other relevant College employment and student policies and procedures, including:  Safeguarding and Child Protection Policy and Procedure  IT Users Code of Conduct  Mobile Device Policy and Procedure  CRB, ISA and Rehabilitation of Offenders Policy  Staff and Student Disciplinary Policies and Procedures  Data Protection Policy and Procedure 8 Review This policy will be reviewed every three years, or earlier where new technological developments suggest revision is necessary.
  • 8. 8 of 9 Appendix 1 What to do in the event of discovering an e-Safety incident (see Section 6.1) College staff suspect e-Safety issue/problem Report to Safeguarding Officer Illegal activity Head of IT Services report and liaison Breach of College rules on E-Safety Report to Police Disciplinary
  • 9. 9 of 9 Appendix 2 The misuse of College systems Inappropriate online activities Users of College IT systems should not engage in the online activities below, but this list is not exhaustive:  Any online activities that would be considered illegal  Viewing or uploading of pornography or adult material  Promotion of any kind of discrimination  Threatening behavior including promotion of physical violence or mental harm  any other information which may be offensive to colleagues, breaches the integrity of the ethos of the College, or brings the College into disrepute  Use of College systems to run a private business  Use of mechanisms that bypass the filtering or other safeguards employed by the college  Downloading or installation of commercial software or copyrighted material without the necessary licensing permissions  Revealing or publicising confidential or proprietary information (e.g. financial / personal information, databases, computer / network access codes and passwords)  Creating or propagating computer viruses or other harmful files  Carrying out sustained or instantaneous high volume network traffic that causes network congestion and hinders others in their use of the internet.  On-line gaming and gambling  File sharing Action in the event of misuse of ICT All members of the College community are expected to be responsible users of ICT who follow the requirements of this policy. However, there may be times when infringements of the policy could take place through careless or deliberate misuse. Students discovered to be engaged in activities such as those listed above are subject to the Student Disciplinary Procedure. Staff will be subject to the Staff Disciplinary Procedure. The Head of IT Services should be alerted to the nature of the activity to ensure that changes to the system can be restored and any unauthorised activity or software can be removed.