SlideShare a Scribd company logo
1 of 26
Safeguarding: online threats and safety
Scope
• Many of the key safeguarding challenges
faced by learners either occur online or are
amplified in a variety of online situations
•Some safeguarding challenges may be
mitigated online
•Online threats to safety will arise within and
without the learning setting
•Statutory safeguarding guidance and OfSTED
inspection framework highlight online safety
Specified safeguarding issues
• child sexual exploitation (CSE)
• bullying /cyberbullying
• domestic violence
• drugs
• fabricated or induced illness
• faith abuse
• female genital mutilation
• forced marriage
• challenging family
circumstances
• honour based violence
• homelessness
• initiation/hazing type violence
and rituals
• serious crime
• breast ironing
• gangs and youth violence
• child criminal exploitation:
county lines
• gender-based violence
• mental health
• private fostering
• radicalisation
• sexting
• teenage relationship abuse:
peer on peer
• modern slavery and
trafficking
• upskirting
Safeguarding goal
• To empower learners to navigate their way
through the virtual and online worlds in ways
that are informed, beneficial, confident and
safe
• As many of our learners are now studying at
home and online, this assumes even greater
importance than usual
Statutory guidance
• As schools and colleges increasingly work online,
it is essential that learners are safeguarded from
potentially harmful and inappropriate online
material. As such, governing bodies and
proprietors should ensure appropriate filters and
appropriate monitoring systems are in place.
Additional information to support governing
bodies and proprietors keep their children safe
online is provided in Annex C (KCSIE 2019)
Statutory guidance: annex C
• Content: being exposed to illegal, inappropriate
or harmful material: for example fake news,
racist, radical and extremist views
• Contact: being subjected to harmful online
interaction with other users: for example
commercial advertising as well as adults posing
as children or young adults: and
• Conduct: personal online behaviour that
increases the likelihood of, or causes, harm: for
example making, sending and receiving explicit
images, or online bullying
Statutory guidance: IT system filters
• Providers’ IT systems should use appropriate filters and
monitoring systems in order to identify access to inappropriate
sites and content
• The use/choice of filters should be informed partly by Prevent
Duty risk assessment
• Prevent Guidance: providers are required to ensure learners are
safe from terrorist and extremist material when accessing the
internet in school/college by establishing appropriate levels of
filtering
• KCSIE: providers must ensure learners should not be able to access
harmful or inappropriate material from their IT system. However,
providers will need to be careful that “over-blocking” does not
lead to unreasonable restrictions as to what learners can be
taught with regards to online teaching and safeguarding
Inappropriate content - filters
CONTENT EXPLANATION
Discrimination Promotes unjust or prejudicial treatment of people with
protected characteristics of the Equality Act 2010
Drugs/substance
misuse
Displays or promotes the illegal use of drugs or substances
Extremism Promotes terrorism and terrorist ideologies, violence or
intolerance
Malware/hacking Promotes the compromising of systems including anonymous
browsing and other filter bypass tools as well as sites hosting
malicious content
Pornography Displays sexual acts or explicit images
Self-harm Promotes or displays deliberate self harm including suicide and
eating disorders
Violence Displays or promotes use of physical force intended to hurt or kill
Filter system features
Age-appropriate, differentiated filtering Ability to vary filtering by age and role
Circumvention – identify /manage
techniques that circumvent your system
VPN, proxy services etc
Control User able to control filter and to permit
or deny access to specific content
Group/site management Deployment consistently across multiple
sites with central oversight
Identification Capacity to identify users / terminals
Multiple language support Capacity to manage relevant languages
Reporting Capacity to report inappropriate content
being accessed so it can be blocked
Reports Provides clear historical information on
the websites visited by your users
Statutory guidance: IT system filters
• Use of IT system filters and the information it
provides should be covered and cross- referred to
in your organisation’s Privacy/GDPR policy
• What would you do if your filtering system
identified that a network user had typed into the
browser one after the other:
House of Commons
How to make a nuclear explosive ?
Statutory guidance: IT system filters
• Guidance on filtering can be accessed on:
UK Safer Internet Centre: appropriate filtering and
monitoring
And from the
National Education Network
Deciphering language used online
RUMORF LMIRL WTGP ASL PIR
POS PAL KPC ROFL 420
8 BMS MERK GOT FOOD
YOLO SKET Any more? Any more? Any more?
Deciphering language used online
RUMORF
Are you male
or female?
LMIRL
Lets meet in
real life
WTGP
Want to go
private?
ASL
Age sex
location
PIR
Parent in
room
POS
Parent over
shoulder
PAL
Parents are
listening
KPC
Keep
parents
clueless
ROFL
Rolling on
floor
laughing
420
Marijuana
8
Oral sex
BMS
Baby making
sex
MERK
Murder or
kill
GOT
Going out of
town
FOOD
Drugs
YOLO
You only live
once
SKET
Slut
Any more? Any more? Any more?
Meeting people online
Getting home from work WonderWoman logged on. She checked her buddy list and saw that
GoTo123 was online. She sent him a message and he replied:
1. WonderWoman:
I’m glad you are there.
I think someone was
following me home.
Really weird!!
2. GoTo123:
LOL. Why would anyone
follow you? Don’t you
live in a safe area?
3. WonderWoman:
I do. Safe & boring! I
must be imagining
things. I couldn’t see
anyone when I looked
4. GoTo123:
Unless you gave your
name out online – you
haven’t done that have
you?
5. WonderWoman:
No!!! I am not daft!!
6. GoTo123:
Did you have football
today?
7. WonderWoman:
Yes. We won! Of course!
We will win the league –
no question
8. GoTo123:
Great. Who did you play?
9. WonderWoman:
We played the usual
local lot. Their outfits
are so gross! They
look like bees
10. GoTo123:
What’s your team called
again?
11. WonderWoman:
The Valley Cats. That’s
why we have the kittens
on our shirts. It’s the
under 17s.
12. GoTo123
Did you score?
13. WonderWoman:
Thankfully NO!! I am
in goal. Disaster if I did
– I’m number 7
14. GoTo123:
Goalkeepers are always
underestimated. 7 is my
lucky number
15. WonderWoman:
I have to go – got to cook
dinner for my mum when
she gets home. Bye!
16. GoTo123:
Speak later. Take care.
LMIRL. Bye
Meeting people online
Ashleigh Hall was 16 and a learner at her local FE college. She was popular and had
over 400 friends on Facebook. One autumn she added a handsome bare-chested 17
year old boy to her list of friends. He called himself Peter Cartwright. Ashleigh was
one of 173 people, mostly young women, to accept him as an online friend. She
added him to other networking sites and began to chat with him regularly.
One month later “Cartwright” enticed Ashleigh to meet him in person. She packed
an overnight bag and told her mother she was staying overnight with a girlfriend.
“Cartwright” texted Ashleigh to say that he was playing football and that his dad
would pick her up at the station and bring her to the house. This was followed by
another text from the “father” from another phone.
Within hours Ashleigh had been raped and killed. Her body was dumped in a field.
Peter Cartwright and his father never existed. The fake Facebook profile was created
by convicted sex offender Peter Chapman. He was subsequently arrested and
sentenced to 35 years in jail
Meeting people online
Ashleigh’s college friends created a set of rules to help keep young people safe as
they met people online: They are called Ashleigh’s Rules.
• If you meet someone in real life who you have only met
previously online, take some friends with you
• When you meet them in real life meet in a public, well lit place
• Tell a friend the name of the person you are meeting, where you
are going and when you will be back. They should alert someone
if you do not return on time
• Arrange to call a friend during your real life meeting to confirm
you are ok. Your friend should alert someone if you do not call
• Never accept anyone on social networking sites you don’t know
• Never trust anyone you have only met online
• Never tell a stranger online anything personal about yourself, like
your date of birth or where you live
Sexting – the law
• The sharing online of intimate photographs – with or without consent
• Protection of Children Act 1978, Chapter 37 as amended by sect 45 of the
Sexual Offences Act 2003 creates the following offences:
• a) to take, permit to be taken, or to make any indecent photograph, or pseudo-
photograph of a child:
• b) to distribute or show such indecent photographs or pseudo-photographs
• c) to have in his possession such indecent photographs or pseudo-photographs
with a view to their being distributed or shown by himself or others
• Applies to all under 18s
• It's not a crime to send intimate images or videos of yourself privately to
another person if both are consenting adults. It's a crime to show intimate
images or videos, send them to another person, upload them to a website, or
threaten to do this, without consent.
• Circumstances and motive are irrelevant to the question of indecency
• An image on the internet has no natural lifespan
• A prosecution for any of these offences can place the offender on the sex
offenders’ register for a period commensurate with their sentence – times may
be reduced for under 18s
Sexting
• First time offenders may not always face prosecution, although authorities will
wish to ensure that any young people involved are safe
• CEOP urges a balance be struck between a criminal justice approach and an
educational and safeguarding approach
• Children and young people obviously have a natural and healthy propensity to
experiment with and explore their developing sexuality. This can include taking
and sharing explicit photographs
• The reasons why children and young people post sexual images of themselves
will vary
• Children and young people creating indecent images of themselves may be an
indicator of other underlying vulnerabilities and risks
• Some self-taken indecent images will be as a result of grooming and facilitation
by adult offenders
• Chief Police Officers do not support the prosecution or criminalisation of
children for taking indecent images of themselves and sharing them
• They support a safeguarding approach being at the heart of any intervention –
the welfare of the child should be paramount
Sexting – curriculum intervention
• Learners need to understand the legal position
• They also need to understand the risks of sexting – personal and
professional
• Given that very many young people are and are likely to continue
sexting, the safeguarding curriculum challenge is to deliver
curriculum content that enables learners to make informed
choices about whether, what and with whom to share -
empowerment rather than prohibition
• CEOP resources
• Practical strategies
• Encouragement to report problems arising from sexting to
Designated Safeguarding Officers
Prevent - radicalisation
• Much radicalisation occurs and/or has a significant element of
online content and contact
• Filtering of provider systems should pick up key words and the
accessing of the websites and email addresses of
proscribed/banned organisations
• Examples of online material of concern include:
• Articles, images, speeches or videos that promote terrorism or
encourage violence
• Content encouraging people to commit acts of terrorism
• Websites made by terrorist or extremist organisations
• Videos of terrorist attacks
• These can be reported to: https://www.gov.uk/report-terrorism
• The Government publishes a list of proscribed organisations.
These can be found on:
https://www.gov.uk/government/publications/proscribed-terror-
groups-ororganisations--2
Radicalisation – grooming – critical thinking
• Grooming describes the process by which radicalisers and sexual
abusers draw unsuspecting individuals into a relationship of trust
from which their actions can be manipulated
• The groomer has a medium to long-term plan for the individual
being groomed
• The individual being groomed is unaware of the grooming plan,
experiencing it only in consecutive “baby steps”
• If the individual being groomed knew of the groomer’s plan it
would cease to have any power
• The safeguarding curriculum challenge is to deliver curriculum
content that enables learners to recognise the features of
grooming and to report them to DSOs
• In the case of radicalising grooming the challenge is to support
learners to critique content they may come across – the
development of critical thinking
Radicalisation – grooming – critical thinking
1
Manipulating
2
Respecting
3
Pressuring
4
Threatening
5
Isolating
6
Pretending to
have “special
knowledge”
7
Being a true
friend
8
Forcing a
decision to be
made now
9
Encouraging
the target to
ask questions
10
Seeming to
have all the
answers
11
Being kind
12
Having a sense
of humour
13
Making the
target feel
guilty
14
Being willing to
change their
mind
15
Being
completely
upfront
16
Not being
completely
upfront
17
Providing
evidence for
their
arguments
18
Not providing
evidence for
their
arguments
???? ???
Radicalisation – critical questioning
Develop questions that can always be asked of online contact/
content:
• What is the evidence for this?
• What happens to me if things go wrong?
• Why don’t you respect me?
• Why can’t I say “no” and still be friends with you?
• What are the arguments against this?
• What is the organisation you belong to called?
• Why shouldn’t I tell my family and friends about this?
• What would you do if I told the police about this?
• Any others?
Learners can choose their five favourite questions, drawing from
their own and those of others- and keep them as the set of
questions they will always ask
Radicalisation – critical thinking – what is evidence?
• Going back to the grid of radicalising behaviours – take a
scenario and for each of the points identify examples /
evidence for their presence or non – presence
• Explore what the work “evidence” means:
• Someone’s made up story?
• A joke?
• A poem?
• Provable information that supports an argument
• Information that comes from more than one source
• Facts that give you a reason for something
• Look at the circulated case study:
• What could have you done prior to the events happening to
help avoid them and keep yourself safe?
• What could you have done once the events had occurred or as
they were occurring?
• What should your organisation have done proactively to help
prevent situations such as these occurring?
• What should your organisation do once the situations have
occurred?
Safeguarding staff
Safeguarding learners from online threats and ensuring safety

More Related Content

What's hot

Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?cloestead
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8jbpruden1
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviourcpsocialmedia
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom WallFrederick Lane
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?Frederick Lane
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Michigan Law: Domestic Violence & PPO
Michigan Law: Domestic Violence & PPOMichigan Law: Domestic Violence & PPO
Michigan Law: Domestic Violence & PPOartbusch
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Tin180 VietNam
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet AddictionReuben Millare
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcourssuser774ad41
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipErica Reid
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 

What's hot (20)

Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying- Assignment 8
Cyberbullying- Assignment 8Cyberbullying- Assignment 8
Cyberbullying- Assignment 8
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Michigan Law: Domestic Violence & PPO
Michigan Law: Domestic Violence & PPOMichigan Law: Domestic Violence & PPO
Michigan Law: Domestic Violence & PPO
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying and Internet Addiction
Cyberbullying and Internet AddictionCyberbullying and Internet Addiction
Cyberbullying and Internet Addiction
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
© Houghton mifflin harcour
© Houghton mifflin harcour© Houghton mifflin harcour
© Houghton mifflin harcour
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 

Similar to Safeguarding learners from online threats and ensuring safety

E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parentsKaren Brooks
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...IEFE
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 

Similar to Safeguarding learners from online threats and ensuring safety (20)

Online safety
Online safetyOnline safety
Online safety
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parents
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Dont delete.pptx
Dont delete.pptxDont delete.pptx
Dont delete.pptx
 

More from The Pathway Group

Responsible Individual Training - F5 Foster Care.pptx
Responsible Individual Training -  F5 Foster Care.pptxResponsible Individual Training -  F5 Foster Care.pptx
Responsible Individual Training - F5 Foster Care.pptxThe Pathway Group
 
Responsible Individual Training fostercare- F5 Foster Care UK
Responsible Individual Training  fostercare-  F5 Foster Care UKResponsible Individual Training  fostercare-  F5 Foster Care UK
Responsible Individual Training fostercare- F5 Foster Care UKThe Pathway Group
 
Pathway Group 2024 by Safaraz Ali.pdf
Pathway Group 2024 by Safaraz Ali.pdfPathway Group 2024 by Safaraz Ali.pdf
Pathway Group 2024 by Safaraz Ali.pdfThe Pathway Group
 
1973 Toyota Production System Handbook
1973 Toyota Production System Handbook1973 Toyota Production System Handbook
1973 Toyota Production System HandbookThe Pathway Group
 
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdfMulticultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdfThe Pathway Group
 
Empowering The Nation - White Paper .pdf
Empowering The Nation - White Paper .pdfEmpowering The Nation - White Paper .pdf
Empowering The Nation - White Paper .pdfThe Pathway Group
 
Peer Meetup by Safaraz Ali 13.Oct.2023.pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.pdfPeer Meetup by Safaraz Ali 13.Oct.2023.pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.pdfThe Pathway Group
 
Peer Meetup by Safaraz Ali 13.Oct.2023.ppt
Peer Meetup by Safaraz Ali 13.Oct.2023.pptPeer Meetup by Safaraz Ali 13.Oct.2023.ppt
Peer Meetup by Safaraz Ali 13.Oct.2023.pptThe Pathway Group
 
A Guide to Apprenticeships for the Higher Education Sector.pdf
A Guide to Apprenticeships for the Higher Education Sector.pdfA Guide to Apprenticeships for the Higher Education Sector.pdf
A Guide to Apprenticeships for the Higher Education Sector.pdfThe Pathway Group
 
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdfAll Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdfThe Pathway Group
 
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pptAll Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pptThe Pathway Group
 
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...The Pathway Group
 
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...The Pathway Group
 
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...The Pathway Group
 
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...The Pathway Group
 
The World of Learning - Apprenticeship Training Material - Pathway Group.ppt
The World of Learning - Apprenticeship Training Material - Pathway Group.pptThe World of Learning - Apprenticeship Training Material - Pathway Group.ppt
The World of Learning - Apprenticeship Training Material - Pathway Group.pptThe Pathway Group
 
The World of Learning - Apprenticeship Training Material - Pathway Group.pdf
The World of Learning - Apprenticeship Training Material - Pathway Group.pdfThe World of Learning - Apprenticeship Training Material - Pathway Group.pdf
The World of Learning - Apprenticeship Training Material - Pathway Group.pdfThe Pathway Group
 
How Independent Training Providers (ITPs) can survive and thrive in an inflat...
How Independent Training Providers (ITPs) can survive and thrive in an inflat...How Independent Training Providers (ITPs) can survive and thrive in an inflat...
How Independent Training Providers (ITPs) can survive and thrive in an inflat...The Pathway Group
 
Birmingham Pakistani Report PDF June 2023.pdf
Birmingham Pakistani Report PDF June 2023.pdfBirmingham Pakistani Report PDF June 2023.pdf
Birmingham Pakistani Report PDF June 2023.pdfThe Pathway Group
 
Multicultural Apprenticeship Alliance Launch Slide - Safaraz Ali
Multicultural Apprenticeship Alliance Launch Slide - Safaraz AliMulticultural Apprenticeship Alliance Launch Slide - Safaraz Ali
Multicultural Apprenticeship Alliance Launch Slide - Safaraz AliThe Pathway Group
 

More from The Pathway Group (20)

Responsible Individual Training - F5 Foster Care.pptx
Responsible Individual Training -  F5 Foster Care.pptxResponsible Individual Training -  F5 Foster Care.pptx
Responsible Individual Training - F5 Foster Care.pptx
 
Responsible Individual Training fostercare- F5 Foster Care UK
Responsible Individual Training  fostercare-  F5 Foster Care UKResponsible Individual Training  fostercare-  F5 Foster Care UK
Responsible Individual Training fostercare- F5 Foster Care UK
 
Pathway Group 2024 by Safaraz Ali.pdf
Pathway Group 2024 by Safaraz Ali.pdfPathway Group 2024 by Safaraz Ali.pdf
Pathway Group 2024 by Safaraz Ali.pdf
 
1973 Toyota Production System Handbook
1973 Toyota Production System Handbook1973 Toyota Production System Handbook
1973 Toyota Production System Handbook
 
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdfMulticultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
 
Empowering The Nation - White Paper .pdf
Empowering The Nation - White Paper .pdfEmpowering The Nation - White Paper .pdf
Empowering The Nation - White Paper .pdf
 
Peer Meetup by Safaraz Ali 13.Oct.2023.pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.pdfPeer Meetup by Safaraz Ali 13.Oct.2023.pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.pdf
 
Peer Meetup by Safaraz Ali 13.Oct.2023.ppt
Peer Meetup by Safaraz Ali 13.Oct.2023.pptPeer Meetup by Safaraz Ali 13.Oct.2023.ppt
Peer Meetup by Safaraz Ali 13.Oct.2023.ppt
 
A Guide to Apprenticeships for the Higher Education Sector.pdf
A Guide to Apprenticeships for the Higher Education Sector.pdfA Guide to Apprenticeships for the Higher Education Sector.pdf
A Guide to Apprenticeships for the Higher Education Sector.pdf
 
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdfAll Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
 
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pptAll Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
 
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
 
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
 
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
 
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
How Apprenticeships Work & Why They Work - Apprenticeship Training Material -...
 
The World of Learning - Apprenticeship Training Material - Pathway Group.ppt
The World of Learning - Apprenticeship Training Material - Pathway Group.pptThe World of Learning - Apprenticeship Training Material - Pathway Group.ppt
The World of Learning - Apprenticeship Training Material - Pathway Group.ppt
 
The World of Learning - Apprenticeship Training Material - Pathway Group.pdf
The World of Learning - Apprenticeship Training Material - Pathway Group.pdfThe World of Learning - Apprenticeship Training Material - Pathway Group.pdf
The World of Learning - Apprenticeship Training Material - Pathway Group.pdf
 
How Independent Training Providers (ITPs) can survive and thrive in an inflat...
How Independent Training Providers (ITPs) can survive and thrive in an inflat...How Independent Training Providers (ITPs) can survive and thrive in an inflat...
How Independent Training Providers (ITPs) can survive and thrive in an inflat...
 
Birmingham Pakistani Report PDF June 2023.pdf
Birmingham Pakistani Report PDF June 2023.pdfBirmingham Pakistani Report PDF June 2023.pdf
Birmingham Pakistani Report PDF June 2023.pdf
 
Multicultural Apprenticeship Alliance Launch Slide - Safaraz Ali
Multicultural Apprenticeship Alliance Launch Slide - Safaraz AliMulticultural Apprenticeship Alliance Launch Slide - Safaraz Ali
Multicultural Apprenticeship Alliance Launch Slide - Safaraz Ali
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Safeguarding learners from online threats and ensuring safety

  • 2. Scope • Many of the key safeguarding challenges faced by learners either occur online or are amplified in a variety of online situations •Some safeguarding challenges may be mitigated online •Online threats to safety will arise within and without the learning setting •Statutory safeguarding guidance and OfSTED inspection framework highlight online safety
  • 3. Specified safeguarding issues • child sexual exploitation (CSE) • bullying /cyberbullying • domestic violence • drugs • fabricated or induced illness • faith abuse • female genital mutilation • forced marriage • challenging family circumstances • honour based violence • homelessness • initiation/hazing type violence and rituals • serious crime • breast ironing • gangs and youth violence • child criminal exploitation: county lines • gender-based violence • mental health • private fostering • radicalisation • sexting • teenage relationship abuse: peer on peer • modern slavery and trafficking • upskirting
  • 4. Safeguarding goal • To empower learners to navigate their way through the virtual and online worlds in ways that are informed, beneficial, confident and safe • As many of our learners are now studying at home and online, this assumes even greater importance than usual
  • 5. Statutory guidance • As schools and colleges increasingly work online, it is essential that learners are safeguarded from potentially harmful and inappropriate online material. As such, governing bodies and proprietors should ensure appropriate filters and appropriate monitoring systems are in place. Additional information to support governing bodies and proprietors keep their children safe online is provided in Annex C (KCSIE 2019)
  • 6. Statutory guidance: annex C • Content: being exposed to illegal, inappropriate or harmful material: for example fake news, racist, radical and extremist views • Contact: being subjected to harmful online interaction with other users: for example commercial advertising as well as adults posing as children or young adults: and • Conduct: personal online behaviour that increases the likelihood of, or causes, harm: for example making, sending and receiving explicit images, or online bullying
  • 7. Statutory guidance: IT system filters • Providers’ IT systems should use appropriate filters and monitoring systems in order to identify access to inappropriate sites and content • The use/choice of filters should be informed partly by Prevent Duty risk assessment • Prevent Guidance: providers are required to ensure learners are safe from terrorist and extremist material when accessing the internet in school/college by establishing appropriate levels of filtering • KCSIE: providers must ensure learners should not be able to access harmful or inappropriate material from their IT system. However, providers will need to be careful that “over-blocking” does not lead to unreasonable restrictions as to what learners can be taught with regards to online teaching and safeguarding
  • 8. Inappropriate content - filters CONTENT EXPLANATION Discrimination Promotes unjust or prejudicial treatment of people with protected characteristics of the Equality Act 2010 Drugs/substance misuse Displays or promotes the illegal use of drugs or substances Extremism Promotes terrorism and terrorist ideologies, violence or intolerance Malware/hacking Promotes the compromising of systems including anonymous browsing and other filter bypass tools as well as sites hosting malicious content Pornography Displays sexual acts or explicit images Self-harm Promotes or displays deliberate self harm including suicide and eating disorders Violence Displays or promotes use of physical force intended to hurt or kill
  • 9. Filter system features Age-appropriate, differentiated filtering Ability to vary filtering by age and role Circumvention – identify /manage techniques that circumvent your system VPN, proxy services etc Control User able to control filter and to permit or deny access to specific content Group/site management Deployment consistently across multiple sites with central oversight Identification Capacity to identify users / terminals Multiple language support Capacity to manage relevant languages Reporting Capacity to report inappropriate content being accessed so it can be blocked Reports Provides clear historical information on the websites visited by your users
  • 10. Statutory guidance: IT system filters • Use of IT system filters and the information it provides should be covered and cross- referred to in your organisation’s Privacy/GDPR policy • What would you do if your filtering system identified that a network user had typed into the browser one after the other: House of Commons How to make a nuclear explosive ?
  • 11. Statutory guidance: IT system filters • Guidance on filtering can be accessed on: UK Safer Internet Centre: appropriate filtering and monitoring And from the National Education Network
  • 12. Deciphering language used online RUMORF LMIRL WTGP ASL PIR POS PAL KPC ROFL 420 8 BMS MERK GOT FOOD YOLO SKET Any more? Any more? Any more?
  • 13. Deciphering language used online RUMORF Are you male or female? LMIRL Lets meet in real life WTGP Want to go private? ASL Age sex location PIR Parent in room POS Parent over shoulder PAL Parents are listening KPC Keep parents clueless ROFL Rolling on floor laughing 420 Marijuana 8 Oral sex BMS Baby making sex MERK Murder or kill GOT Going out of town FOOD Drugs YOLO You only live once SKET Slut Any more? Any more? Any more?
  • 14. Meeting people online Getting home from work WonderWoman logged on. She checked her buddy list and saw that GoTo123 was online. She sent him a message and he replied: 1. WonderWoman: I’m glad you are there. I think someone was following me home. Really weird!! 2. GoTo123: LOL. Why would anyone follow you? Don’t you live in a safe area? 3. WonderWoman: I do. Safe & boring! I must be imagining things. I couldn’t see anyone when I looked 4. GoTo123: Unless you gave your name out online – you haven’t done that have you? 5. WonderWoman: No!!! I am not daft!! 6. GoTo123: Did you have football today? 7. WonderWoman: Yes. We won! Of course! We will win the league – no question 8. GoTo123: Great. Who did you play? 9. WonderWoman: We played the usual local lot. Their outfits are so gross! They look like bees 10. GoTo123: What’s your team called again? 11. WonderWoman: The Valley Cats. That’s why we have the kittens on our shirts. It’s the under 17s. 12. GoTo123 Did you score? 13. WonderWoman: Thankfully NO!! I am in goal. Disaster if I did – I’m number 7 14. GoTo123: Goalkeepers are always underestimated. 7 is my lucky number 15. WonderWoman: I have to go – got to cook dinner for my mum when she gets home. Bye! 16. GoTo123: Speak later. Take care. LMIRL. Bye
  • 15. Meeting people online Ashleigh Hall was 16 and a learner at her local FE college. She was popular and had over 400 friends on Facebook. One autumn she added a handsome bare-chested 17 year old boy to her list of friends. He called himself Peter Cartwright. Ashleigh was one of 173 people, mostly young women, to accept him as an online friend. She added him to other networking sites and began to chat with him regularly. One month later “Cartwright” enticed Ashleigh to meet him in person. She packed an overnight bag and told her mother she was staying overnight with a girlfriend. “Cartwright” texted Ashleigh to say that he was playing football and that his dad would pick her up at the station and bring her to the house. This was followed by another text from the “father” from another phone. Within hours Ashleigh had been raped and killed. Her body was dumped in a field. Peter Cartwright and his father never existed. The fake Facebook profile was created by convicted sex offender Peter Chapman. He was subsequently arrested and sentenced to 35 years in jail
  • 16. Meeting people online Ashleigh’s college friends created a set of rules to help keep young people safe as they met people online: They are called Ashleigh’s Rules. • If you meet someone in real life who you have only met previously online, take some friends with you • When you meet them in real life meet in a public, well lit place • Tell a friend the name of the person you are meeting, where you are going and when you will be back. They should alert someone if you do not return on time • Arrange to call a friend during your real life meeting to confirm you are ok. Your friend should alert someone if you do not call • Never accept anyone on social networking sites you don’t know • Never trust anyone you have only met online • Never tell a stranger online anything personal about yourself, like your date of birth or where you live
  • 17. Sexting – the law • The sharing online of intimate photographs – with or without consent • Protection of Children Act 1978, Chapter 37 as amended by sect 45 of the Sexual Offences Act 2003 creates the following offences: • a) to take, permit to be taken, or to make any indecent photograph, or pseudo- photograph of a child: • b) to distribute or show such indecent photographs or pseudo-photographs • c) to have in his possession such indecent photographs or pseudo-photographs with a view to their being distributed or shown by himself or others • Applies to all under 18s • It's not a crime to send intimate images or videos of yourself privately to another person if both are consenting adults. It's a crime to show intimate images or videos, send them to another person, upload them to a website, or threaten to do this, without consent. • Circumstances and motive are irrelevant to the question of indecency • An image on the internet has no natural lifespan • A prosecution for any of these offences can place the offender on the sex offenders’ register for a period commensurate with their sentence – times may be reduced for under 18s
  • 18. Sexting • First time offenders may not always face prosecution, although authorities will wish to ensure that any young people involved are safe • CEOP urges a balance be struck between a criminal justice approach and an educational and safeguarding approach • Children and young people obviously have a natural and healthy propensity to experiment with and explore their developing sexuality. This can include taking and sharing explicit photographs • The reasons why children and young people post sexual images of themselves will vary • Children and young people creating indecent images of themselves may be an indicator of other underlying vulnerabilities and risks • Some self-taken indecent images will be as a result of grooming and facilitation by adult offenders • Chief Police Officers do not support the prosecution or criminalisation of children for taking indecent images of themselves and sharing them • They support a safeguarding approach being at the heart of any intervention – the welfare of the child should be paramount
  • 19. Sexting – curriculum intervention • Learners need to understand the legal position • They also need to understand the risks of sexting – personal and professional • Given that very many young people are and are likely to continue sexting, the safeguarding curriculum challenge is to deliver curriculum content that enables learners to make informed choices about whether, what and with whom to share - empowerment rather than prohibition • CEOP resources • Practical strategies • Encouragement to report problems arising from sexting to Designated Safeguarding Officers
  • 20. Prevent - radicalisation • Much radicalisation occurs and/or has a significant element of online content and contact • Filtering of provider systems should pick up key words and the accessing of the websites and email addresses of proscribed/banned organisations • Examples of online material of concern include: • Articles, images, speeches or videos that promote terrorism or encourage violence • Content encouraging people to commit acts of terrorism • Websites made by terrorist or extremist organisations • Videos of terrorist attacks • These can be reported to: https://www.gov.uk/report-terrorism • The Government publishes a list of proscribed organisations. These can be found on: https://www.gov.uk/government/publications/proscribed-terror- groups-ororganisations--2
  • 21. Radicalisation – grooming – critical thinking • Grooming describes the process by which radicalisers and sexual abusers draw unsuspecting individuals into a relationship of trust from which their actions can be manipulated • The groomer has a medium to long-term plan for the individual being groomed • The individual being groomed is unaware of the grooming plan, experiencing it only in consecutive “baby steps” • If the individual being groomed knew of the groomer’s plan it would cease to have any power • The safeguarding curriculum challenge is to deliver curriculum content that enables learners to recognise the features of grooming and to report them to DSOs • In the case of radicalising grooming the challenge is to support learners to critique content they may come across – the development of critical thinking
  • 22. Radicalisation – grooming – critical thinking 1 Manipulating 2 Respecting 3 Pressuring 4 Threatening 5 Isolating 6 Pretending to have “special knowledge” 7 Being a true friend 8 Forcing a decision to be made now 9 Encouraging the target to ask questions 10 Seeming to have all the answers 11 Being kind 12 Having a sense of humour 13 Making the target feel guilty 14 Being willing to change their mind 15 Being completely upfront 16 Not being completely upfront 17 Providing evidence for their arguments 18 Not providing evidence for their arguments ???? ???
  • 23. Radicalisation – critical questioning Develop questions that can always be asked of online contact/ content: • What is the evidence for this? • What happens to me if things go wrong? • Why don’t you respect me? • Why can’t I say “no” and still be friends with you? • What are the arguments against this? • What is the organisation you belong to called? • Why shouldn’t I tell my family and friends about this? • What would you do if I told the police about this? • Any others? Learners can choose their five favourite questions, drawing from their own and those of others- and keep them as the set of questions they will always ask
  • 24. Radicalisation – critical thinking – what is evidence? • Going back to the grid of radicalising behaviours – take a scenario and for each of the points identify examples / evidence for their presence or non – presence • Explore what the work “evidence” means: • Someone’s made up story? • A joke? • A poem? • Provable information that supports an argument • Information that comes from more than one source • Facts that give you a reason for something
  • 25. • Look at the circulated case study: • What could have you done prior to the events happening to help avoid them and keep yourself safe? • What could you have done once the events had occurred or as they were occurring? • What should your organisation have done proactively to help prevent situations such as these occurring? • What should your organisation do once the situations have occurred? Safeguarding staff