Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Your Professional Identity Ken Corish Education Adviser ICT Plymouth Children’s and Young People’s Trust Chair of South West Grid for Learning.

Similar presentations


Presentation on theme: "Protecting Your Professional Identity Ken Corish Education Adviser ICT Plymouth Children’s and Young People’s Trust Chair of South West Grid for Learning."— Presentation transcript:

1 Protecting Your Professional Identity Ken Corish Education Adviser ICT Plymouth Children’s and Young People’s Trust Chair of South West Grid for Learning eSafety Advisory Group

2 Rights and Responsibilities Staff using technology in school Staff using technology socially Cyberbullying and supporting school staff

3 Can I use a school computer to book holidays etc during lunch time or after school? How should I respond if I am subjected to cyber bullying by pupils? Can I respond to a comment about the school on Facebook? Can I use Bebo to discuss a topic with my students? Should I text a pupil in the evening to remind and encourage him to complete a project? Should I continue to use my social network site? Can school limit my private online publishing? Can I use my mobile to take photos or videos on school trips?

4 Responsibilities DCSF Guidance for Safer Working Practice for Adults who Work with Children and Young People. Section 12 Communication with Children and Young People (including the Use of Technology) Adults should not share any personal information with a child or young person. They should not request, or respond to, any personal information from the child/young person, other than that which might be appropriate as part of their professional role. Communication between children and adults, by whatever method, should take place within clear and explicit professional boundaries. This includes the wider use of technology such as mobile phones text messaging, e-mails, digital cameras, videos, web-cams, websites and blogs. Adults should ensure that all communications are transparent and open to scrutiny.

5 Responsibilities General Teaching Council of England Code of Conduct Paragraph 8: Bringing the profession into serious disrepute Conduct in this category would include behaviour which was seriously detrimental to the standing of the profession but where no criminal offence was committed. “not attempt to establish an inappropriate relationship with a pupil by means which might include sending e-mails or text messages to pupils of an inappropriate or personal nature.” “exercise extreme caution in connection with contact/web cam internet sites (for example chat rooms, message boards, social networking sites and newsgroups) and avoid inappropriate communication with individuals under 18 or with whom you may be in a position of trust.”

6 Freedom from physical harm Physical Safety Freedom from cruelty. Harassment and exposure to potentially disturbing material Psychological safety Freedom from unwanted social, academic, professional and legal consequences that could affect you for a lifetime Reputational and legal safety Freedom from theft of identity and property and attacks against networks and online communities at local, national and international levels. Identity, property and community safety

7 Mobile Phones and Cameras Staff Laptops and Online Technologies Personal Data Staff use of technology in school

8 Ensure that advice for staff use of mobile phones is clear, understood and respected via the Acceptable Use Policy If staff need to record images of school activities encourage them to use school phones or cameras Images of pupils on personal devices should be avoided. If temporary (eg SD Card ) transfer images and delete from the personal device. Do not give personal contact details to children or young people, including mobile telephone number. If you feel your number has been compromised then report it to line manager Recognise that text messaging is rarely an appropriate response to a child in a crisis situation or at risk of harm. It should only be used as a last resort when other forms of communication are not possible Taking, uploading and tagging of images of colleagues in either a social or school context may compromise their professional integrity. Staff consider the consequences.

9 Secure your phone when not in use preferably using the phone’s security code or pin. Set your phone’s bluetooth visibility to “hidden” or “off”. Bluetooth is easily compromised with the right software (BlueJacking) Record your phones International Mobile Equipment Identity Number (IMEI) in case it is stolen. Find this by typing *#06# or look underneath the battery If a child HAS to use your phone, supervise the call and delete any numbers afterwards Only contact pupils on THEIR mobiles using a school device

10 Access to wider sites by family members, for instance a gaming site or internet shopping, would increase the possibility of virus attack and identity theft Some adults may feel that access via a school laptop to adult material outside school hours and at home is appropriate. It is not; this type of use has led to dismissal In order for anyone else to use a school laptop in the home setting, they would need to be logged on by the person responsible for the laptop. With this in mind, think about who would be culpable in certain situations. Schools should have clear guidelines and policy on personal use of staff laptops. Increasingly therefore non-professional use is being banned Staff should always they ensure that they have absolute control of a school laptop allocated to their use Staff should not access inappropriate material on a school laptop; ie material that constitutes a risk to children and themselves professionally

11 The school policy on data needs to be clear, understood and respected Keeping personal data within the confines of the school premises mitigates 90% of the risks Avoid storing personal data on removable media like USB sticks, CDs or portable hard drives Devices that contain personal data that leaves the school premises will need to be encrypted Staff are responsible for unauthorised access to personal data that they may use at home

12 Staff use of technology socially

13

14 Be conversant with the sites privacy settings and how to reduce the number of opportunities for your information to be broadcast eg FacebookFacebook Be aware of the number of older sites that you may still have running Reduce vulnerability Limit SN site search results Google your own name occasionally “in inverted commas” Limit SN site Google searches Manage Visibility Avoid information or conversations that could compromise your professional integrity Review site membership where associations could cause difficulties if viewed by the wider profession Avoid conversations about pupils, colleagues or parents on publicly available sites Caution in the subjects you discuss Be aware that many practices on line can be easily compromised Discuss whether you agree to having images or information about you placed or tagged on a colleague’s site Avoid embarrassing wall posts and let colleagues know you will not respond Opt out of the email round of funnies particularly if you have an email account for both school and home Let your colleagues know your expectations

15 Perceived anonymity Cannot see or judge the response of the person Publishing hurtful images can seldom be recalled 24/7 with little respite Increases number of bystanders Much quicker to escalate Distance apart Less aggressive. A bit of a wind-up! What are the differences between physical bullying and cyberbullying? Staff can equally be targeted Different bully profile

16

17

18 Don’t retaliate or engage on a personal level. Report appropriately and get support Keep records; texts, screen prints, times and datesInform your line manager Establish if there is enough information and resource to deal with this in school. If not seek support from an external agency eg LA, SWGfL. If there has been a potential criminal offence, then call the police. They may be able to help with a RIPA (Regulation of Investigatory Powers act 2000) enabling disclosure of information.

19 Keep monitoring and confiscation appropriate. In the esafety policy, make the sanctions clear about how and when confiscation and monitoring will take place Take every claim by young people seriously so that you follow due process in situations where a child has claimed abuse by a member of staff All incident should involve a designated of the SLT who will take responsibility for the management of the incident. If needed, obtain additional pastoral and/or legal support from their Union representative Where appropriate, incidents should be reported to the LADO (Local Authority Designated Officer) Tony Staunton (eSafety Lead Plymouth Safeguarding Children’s Board)

20 All incidents are reported and recorded School will approach third party providers to have offensive materials removed School will respond to and support staff Information on the safe use of technology will be provided to them Staff can expect...

21 THANK YOU QUESTIONS? ken.corish@plymouth.gov.uk www.gotoourplace.com/ictadvice and choose “Protecting Your Professional Identity” from the left hand menu


Download ppt "Protecting Your Professional Identity Ken Corish Education Adviser ICT Plymouth Children’s and Young People’s Trust Chair of South West Grid for Learning."

Similar presentations


Ads by Google