SlideShare a Scribd company logo
Click to edit Master title style Click to edit Master subtitle style   |  slide  Kevin Campbell-Wright Ken Scot   Kathy Boyer E-Learning Advisor (ACL) E-Learning Advisor (Technical)   E-Learning Advisor (FE & ITT) www.rsc-yh.ac.uk RSCs – Stimulating and supporting innovation in learning RSC YH E-Safety & Security The issues & the debates Chris Barber Senior E-Learning Advisor
E-Safety ,[object Object],Why do we need e-safety?  The Case for being safe (Chris Barber) What’s so dangerous?  The E-Safety Issues (Kevin Campbell-Wright & Ken Scott) Am I Accountable?  OFSTED and E-Safety (Kathy Boyer) Your Thoughts .  Group Disscussion (All)
E-Safety ,[object Object],The case for e-safety is simple - just as we don't send children out onto the roads without lessons in road safety, so we shouldn't send people out onto the information highways of the internet without giving them some guidance as to how to stay safe,  both personally and financially. This is a green cross code for internet and PC use. Squirrels are optional .
E-Safety ,[object Object],Well, yes, it’s obvious, but it hasn’t been done consistently so far in education establishments. Becta are now pushing for e-safety to be a part of every child’s curriculum. See “Safeguarding children in a digital world” This is because information technology is becoming a large part of every learner’s learning experience, from pre-school through university to lifelong learners.
E-Safety ,[object Object],Quote from “Safeguarding Children” “ With the launch in 2005 of the Government’s e-strategy, ‘ Harnessing technology: Transforming learning and children’s services ’, the prospects for children and learners of all ages to embrace the new opportunities offered by ICT are set to grow. What we must ensure, however, is that the e-safety aspects are not left to chance. Children and indeed learners of all ages need to develop digital literacy skills that help them to become safe and responsible users of new technologies, and allow them to be discriminating users of both the content they discover and the contacts they make when online.”
E-Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Online Safety Infrastructure Institutional
Online Safety ,[object Object],[object Object],[object Object],[object Object],Incident  Affecting Pupil Incident  Affecting Staff The Risk  Of Not Access to services Access to information Access to communication Sensible, Defined Usage Policy Awareness,  Open Debate & Education
Institutional ,[object Object],[object Object],[object Object],[object Object],Press Scandal Lawsuit Use in “ Private Time” Lack of Governance Clear Staff / Student  Use Procedure Competition Communications Monitoring & reaction Financial Damage Legal Guidance
Infrastructure ,[object Object],[object Object],[object Object],[object Object],Criminal Liability Loss of Service Data Vulnerability Spammer Lists Increased  Workload Complexity Traffic Shaping Time Slots White / Black Lists Reverse Firewall Backups Desktop Monitoring
Emerging Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
E-Safety ,[object Object],From  http://www.excellencegateway.org.uk/page.aspx?o=197297  (on our resources page)
www.rsc-yh.ac.uk update ,[object Object],[object Object],[object Object]
www.rsc-yh.ac.uk Changes Learner safety A3 How safe do learners feel? Learners understanding of internet Safety Measures B Quality of Provision B1 How effectively do teaching, training and assessment support learning and development? Evaluative statements Technology is used effectively to promote and support learning, where appropriate Further Guidance The adequacy and quality of e-learning
www.rsc-yh.ac.uk ,[object Object],[object Object],[object Object],[object Object],“… .. Appropriate use is made of technology to support and promote learning…… Get your  copy here
Click to edit Master title style Click to edit Master subtitle style   |  slide  DISSCUSSION & NOTES: http://etherpad.com/RSCYHe-safety RESOURCES & LINKS: http://delicious.com/tag/eielsafe www.rsc-yh.ac.uk RSCs – Stimulating and supporting innovation in learning RSC YH E-Safety & Security + OFSTED Update

More Related Content

What's hot

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Louise Jones
 
Online E-Safety Resources
Online E-Safety ResourcesOnline E-Safety Resources
Online E-Safety Resources
Jisc RSC East Midlands
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
Securly
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Reji Mae Sunot
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 education
deborahjudah
 
information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologies
selamat permono
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
emilyensign
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
Jisc
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipabaralt
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program emilyensign
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsRitika Kumari
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyJulie
 

What's hot (20)

Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
Scottish Government Ministerial Summit December 2013 Emerging issues for E-Sa...
 
Online E-Safety Resources
Online E-Safety ResourcesOnline E-Safety Resources
Online E-Safety Resources
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Resources
ResourcesResources
Resources
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 education
 
information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologies
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Mobile technologies and the law
Mobile technologies and the lawMobile technologies and the law
Mobile technologies and the law
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Case study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian YouthsCase study on general awareness of Social ethics in ICT on Indian Youths
Case study on general awareness of Social ethics in ICT on Indian Youths
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
 

Viewers also liked

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Volcanoes
VolcanoesVolcanoes
Volcanoes
duncanpatti
 

Viewers also liked (6)

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Volcanoes
VolcanoesVolcanoes
Volcanoes
 

Similar to E-Safety

internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 
internet safety
internet safetyinternet safety
internet safetyawadly
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
John Oxley
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
meetsolanki44
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA Educatation
Gaurav Rathi
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Future Education Magazine
 
E safety presentation staff workshop
E safety presentation staff workshopE safety presentation staff workshop
E safety presentation staff workshop
Cheshire County Council
 
Current Issues In Education Technology WPG Consulting .pdf
Current Issues In Education Technology  WPG Consulting .pdfCurrent Issues In Education Technology  WPG Consulting .pdf
Current Issues In Education Technology WPG Consulting .pdf
meetsolanki44
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Jerry Sakala
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
SamanthaCossart
 
Why e safety
Why e safetyWhy e safety
Why e safetyTFT
 
Why e safety
Why e safetyWhy e safety
Why e safetyTFT
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8sebaraff
 
e-learning sati
e-learning satie-learning sati
e-learning sati
sumit kushwah
 
Westminster education forum isc digital crowd sourcing developing digital oct...
Westminster education forum isc digital crowd sourcing developing digital oct...Westminster education forum isc digital crowd sourcing developing digital oct...
Westminster education forum isc digital crowd sourcing developing digital oct...
InspirEdu
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the FutureMichael Przytula
 
E Safety For Governors
E Safety For GovernorsE Safety For Governors
E Safety For Governors
Cheshire County Council
 

Similar to E-Safety (20)

internetsafety
internetsafetyinternetsafety
internetsafety
 
internet safety
internet safetyinternet safety
internet safety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Information Technology in CA Educatation
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA Educatation
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
E safety presentation staff workshop
E safety presentation staff workshopE safety presentation staff workshop
E safety presentation staff workshop
 
Current Issues In Education Technology WPG Consulting .pdf
Current Issues In Education Technology  WPG Consulting .pdfCurrent Issues In Education Technology  WPG Consulting .pdf
Current Issues In Education Technology WPG Consulting .pdf
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Why e safety
Why e safetyWhy e safety
Why e safety
 
Why e safety
Why e safetyWhy e safety
Why e safety
 
Common sense media pdf k 8
Common sense media pdf k 8Common sense media pdf k 8
Common sense media pdf k 8
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
 
e-learning sati
e-learning satie-learning sati
e-learning sati
 
Westminster education forum isc digital crowd sourcing developing digital oct...
Westminster education forum isc digital crowd sourcing developing digital oct...Westminster education forum isc digital crowd sourcing developing digital oct...
Westminster education forum isc digital crowd sourcing developing digital oct...
 
Building An Education Network for the Future
Building An Education Network for the FutureBuilding An Education Network for the Future
Building An Education Network for the Future
 
E Safety For Governors
E Safety For GovernorsE Safety For Governors
E Safety For Governors
 

More from Kevin Campbell-Wright

Modern Learning
Modern LearningModern Learning
Modern Learning
Kevin Campbell-Wright
 

More from Kevin Campbell-Wright (7)

A Maths App for Digital Literacy
A Maths App for Digital LiteracyA Maths App for Digital Literacy
A Maths App for Digital Literacy
 
Positive deviancy upload version
Positive deviancy   upload versionPositive deviancy   upload version
Positive deviancy upload version
 
Augmented Reality
Augmented RealityAugmented Reality
Augmented Reality
 
Safe shipley 2 upload
Safe shipley 2 uploadSafe shipley 2 upload
Safe shipley 2 upload
 
Modern Learning
Modern LearningModern Learning
Modern Learning
 
E-Portfolio
E-PortfolioE-Portfolio
E-Portfolio
 
The Bigger Picture
The Bigger PictureThe Bigger Picture
The Bigger Picture
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

E-Safety

  • 1. Click to edit Master title style Click to edit Master subtitle style | slide Kevin Campbell-Wright Ken Scot Kathy Boyer E-Learning Advisor (ACL) E-Learning Advisor (Technical) E-Learning Advisor (FE & ITT) www.rsc-yh.ac.uk RSCs – Stimulating and supporting innovation in learning RSC YH E-Safety & Security The issues & the debates Chris Barber Senior E-Learning Advisor
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. www.rsc-yh.ac.uk Changes Learner safety A3 How safe do learners feel? Learners understanding of internet Safety Measures B Quality of Provision B1 How effectively do teaching, training and assessment support learning and development? Evaluative statements Technology is used effectively to promote and support learning, where appropriate Further Guidance The adequacy and quality of e-learning
  • 15.
  • 16. Click to edit Master title style Click to edit Master subtitle style | slide DISSCUSSION & NOTES: http://etherpad.com/RSCYHe-safety RESOURCES & LINKS: http://delicious.com/tag/eielsafe www.rsc-yh.ac.uk RSCs – Stimulating and supporting innovation in learning RSC YH E-Safety & Security + OFSTED Update

Editor's Notes

  1. 10/12/09