Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-Safety: The New OFSTED Framework and how to ensure your school can meet the requirements.

Similar presentations

Presentation on theme: "E-Safety: The New OFSTED Framework and how to ensure your school can meet the requirements."— Presentation transcript:

1 E-Safety: The New OFSTED Framework and how to ensure your school can meet the requirements

2 Agenda What the OFSTED framework says Different aspects of E-Safety Who needs to be involved Everyone’s responsibilities

3 OFSTED In the context of an inspection, e-safety may be described as the school’s ability: to protect and educate pupils and staff in their use of technology to have the appropriate mechanisms to intervene and support any incident where appropriate. from p4, “Inspecting E-Safety”, OFSTED during-inspections-of-maintained-schools-and-academies-september-2

4 Byron Review Schools deemed as outstanding had the following as part of their practice: All staff involved in taking responsibility for e-safety- form tutor periods, PSHE, assemblies as well as an age appropriate curriculum for E-Safety Managed system better than locked down Senior leaders, governors, staff and families worked together to develop a clear strategy for e-safety Good relationships with families built on to support E-safety at home The weakest aspect of provision in schools was support & training for staff

5 What are the issues? 40% of KS 3&4 students have witnessed a “sexting” incident and of that group, 40% didn’t think topless images as inappropriate 28% KS3&4 pupils have been deliberately targeted, threatened or humiliated by use of mobile phone or internet Issues magnified for vulnerable students Pupils with special educational needs are 16% more likely to be victims of online abuse; children from lower socio-economic groups are 12% more likely Around 9% of those aged 12–15 who use the internet say they have had experience of being bullied online in the past year. As with bullying through a mobile phone, this incidence has not changed since 2011. Girls aged 12–15 are more likely than boys to say they have been bullied online in the past year (13% in 2012 compared to 5% in 2011). OFCOM Children and Parents: Media Use and Attitudes Report Oct, 2012.

6 Outstanding Practice see hand-out Whole school consistent approach All teaching and non-teaching staff can recognise and are aware of e-safety issues. High quality leadership and management make e-safety a priority across all areas of the school (the school may also have achieved a recognised standard, for example the e-Safety Mark). A high priority given to training in e-safety, extending expertise widely and building internal capacity. The contribution of pupils, parents and the wider school community is valued and integrated. Robust and integrated reporting routines School-based online reporting processes that are clearly understood by the whole school, allowing the pupils to report issues to nominated staff, for example SHARP. Report Abuse buttons, for example CEOP. Clear, signposted and respected routes to key members of staff. Effective use of peer mentoring and support. Staff All teaching and non-teaching staff receive regular and up-to-date training. At least one staff member has accredited training, for example CEOP, EPICT. Policies Rigorous e-safety policies and procedures are in place, written in plain English, contributed to by the whole school, updated regularly and ratified by governors. The e-safety policy should be integrated with other relevant policies such as behaviour, safeguarding and anti-bullying. The e-safety policy should incorporate an Acceptable Usage Policy that is signed by pupils and/or parents as well as all staff and respected by all. Education A progressive curriculum that is flexible, relevant and engages pupils’ interest; that is used to promote e-safety through teaching pupils how to stay safe, how to protect themselves from harm and how to take responsibility for their own and others’ safety. Positive rewards are used to cultivate positive and responsible use. Peer mentoring programmes. Infrastructure Recognised Internet Service Provider or RBC together with age/maturity related filtering that is actively monitored. Monitoring and Evaluation Risk assessment taken seriously and used to good effect in promoting e-safety. Using data effectively to assess the impact of e-safety practice and how this informs strategy. Management of Personal Data The impact level of personal data is understood and data is managed securely and in accordance with the statutory requirements of the Data Protection Act 1998.

7 Indicators of inadequate practice Personal data is often unsecured and/or leaves school site without encryption. Security of passwords is ineffective, for example passwords are shared or common with all but the youngest children. Policies are generic and not updated. There is no progressive, planned e-safety education across the curriculum, for example there is only an assembly held annually. There is no internet filtering or monitoring. There is no evidence of staff training. Children are not aware of how to report a problem.of how to report a problem.

8 Robust reporting SWGfL concluded in their sexting survey (November 2009) of 1,100 11–16 year olds, that 74% would prefer to report issues to their friends rather than a ‘trusted adult’. The Department or Education (DfE) report The use and effectiveness of anti-bullying strategies (April 2011) refers to multiple reporting routes, consistent whole school approach, good auditing processes and regular self-evaluation. Sharing personal images and videos among young people, SWGfL & Plymouth University, 2009; The use and effectiveness of anti-bullying strategies in schools, Department for Education (DfE), 2011; Who do students speak to if they are worried for themselves or a friend? Who do they speak to if they have witnessed an incident? How are incidents tracked? What do staff do about suspicions/ overheard conversations/ rumours? What role do Peer Mentors have? Does it matter (to you) what students are doing/ saying/ sharing on social networking sites outside of school hours? Does anyone in school know? Are staff “friends” with pupils/ ex-pupils?

9 SHARP One off £320 + £20 pa Hosting fee

10 Different aspects of E-Safety Content-Exposure to illegal, inappropriate or harmful material- pornography, age ratings (film or games), substance abuse, lifestyle websites, hate sites, content validation Contact- Subjected to harmful online interaction with other users- grooming, cyber bullying (all forms), identity theft (including frape, password sharing etc.) Conduct- personal online behaviour that increases the likelihood of, or causes harm- privacy & disclosure of personal information, digital footprint/ online reputation, health & wellbeing- time spent online, sexting/ sharing of personal images, copyright & understanding of intellectual property (music, film, academic) Use the diagram to list risks that staff as well as students could be exposed to.

11 What is Cyber Bullying exactly? Cyberbullying is when a person or a group of people uses the internet, mobile phones, online games or any other kind of digital technology to threaten, tease, upset or humiliate someone else. Definition from Childline


13 Cyberbullying Research Centre survey: half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Cost of dealing with Cyberbullying in teaching hours is almost £18 million per year in the UK says charity Beatbullying Being left out causes more emotional harm than other types of bullying finds NFER

14 Methods of Cyber Bullying Text messages Pictures or video Phone calls Email Chatrooms and IM Social Networks Websites

15 Impact on Victims

16 Who takes responsibility for E-safety in your school? Who, with other areas of responsibility/ management need to take joint responsibility? 360 SAFE Self audit tool Video

17 Help and support

18 Thank you for listening.




Download ppt "E-Safety: The New OFSTED Framework and how to ensure your school can meet the requirements."

Similar presentations

Ads by Google