lead ▪ learn ▪ protect ▪ engage Get ready for e-Safety!
lead ▪ learn ▪ protect ▪ engage e-Safety in the Primary Classroom
lead ▪ learn ▪ protect ▪ engage E-safety resources
lead ▪ learn ▪ protect ▪ engage Purpose of today Build your confidence in using technology to: Provide excellent educational experiences Generate high levels of engagement and commitment to learning Help learners acquire knowledge and develop understanding across the curriculum “Create a culture of e-safety” e-safety in the Primary Classroom
lead ▪ learn ▪ protect ▪ engage e-safety in the Primary Classroom 9.15: e-Safety - what’s happening? Audit and test your knowledge! What do Ofsted say? What is the experience of your learners? What are the risks? What are your priorities? 11am: Break 11.15: Planning a curriculum for e-sense Computing curriculum, new e-Sense progression and BYTE Awards Digital literacy 12.30pm: Lunch 1.30pm: The whole—school picture Evaluation and planning for school improvement 360safe Protecting your professional identify and data protection Working with parents Action planning – Safer Internet Day pm: finish
lead ▪ learn ▪ protect ▪ engage Complete audit What do I know? e-Safety – what’s happening?
lead ▪ learn ▪ protect ▪ engage e-Safety and e-Sense e-Safety What the school does to protect me Staff: teach, listen, model School: policies, systems, filtering e-Sense What I do to protect myself behaviour: develop skills, resilience and responsibility
lead ▪ learn ▪ protect ▪ engage What do Ofsted say? Three areas of risk: content being exposed to illegal, inappropriate or harmful material contact being subjected to harmful online interaction with other users conduct personal online behaviour that increases the likelihood of, or causes, harm. Inspecting e-safety, Sept 2012
lead ▪ learn ▪ protect ▪ engage Ofsted Inspection Framework Sept 2012 Quality of leadership in, and management of the school includes The effectiveness of safeguarding arrangements to ensure that there is safe recruitment and that all pupils are safe. This includes the promotion of safe practices and a culture of safety, including e-safety.
lead ▪ learn ▪ protect ▪ engage
What do you think your children are doing online?
lead ▪ learn ▪ protect ▪ engage 28% of 9-10 year olds in the UK have a social networking account. This rises to 59% of year olds. EU Kids Online year olds have an average of 92 friends on their social networking site. They are unlikely to have met 11 of these. The average number of friends for year olds is 286. Ofcom % of 9-16 year olds go online in their bedroom. (59% of year olds) EU Kids Online % of 3-4 year olds have a TV in their bedroom. Ofcom % of 5-7year olds are mostly using the Internet alone. Ofcom 2012 Nearly 50% of children aged 5–7 have a games console in their bedroom, rising to 70% of those aged 8–15 Ofcom minutes is the average time spent online each day by children in the UK. EU Kids Online 2012 Call of Duty is the favourite game for 5-16 year olds. Childwise Monitor Survey
lead ▪ learn ▪ protect ▪ engage What about your learners?
lead ▪ learn ▪ protect ▪ engage The new Facebooks Instagram SnapChat
lead ▪ learn ▪ protect ▪ engage What are our concerns? What are the concerns of children? Label P (Parent) C (Child) T (Teacher) e-Safety – what’s happening?
lead ▪ learn ▪ protect ▪ engage ‘The Digital Darkness’ Trolling Sexting Self-harm Cyberbullying
lead ▪ learn ▪ protect ▪ engage ‘The Digital Darkness’ - Sexting nology/internet/ /Tallul ah-Wilson-death-bright-futures- extinguished-in-digital- darkness.htmla
lead ▪ learn ▪ protect ▪ engage ‘The Digital Darkness’ -Cyberbullying
lead ▪ learn ▪ protect ▪ engage Key differences: How do these alter an effective response? Impact: the scale and scope of cyberbullying can be greater than other forms of bullying. Targets and perpetrators: the people involved may have a different profile to traditional bullies and their targets. Location: the 24/7 and any place nature of cyberbullying. Anonymity: the person being bullied will not always know who is attacking them. Motivation: some pupils may not be aware that what they are doing is bullying. Evidence: unlike other forms of bullying, the target of the bullying will have evidence of its occurrence. ‘The Digital Darkness’ -Cyberbullying
lead ▪ learn ▪ protect ▪ engage s/combating-cyberbullying-suffering- in-silence games/beaker-you-choose ying/overview dventure/chapter4.aspxhttp:// dventure/chapter4.aspx TELL ‘The Digital Darkness’ -Cyberbullying
lead ▪ learn ▪ protect ▪ engage uk/news/magazine ‘The Digital Darkness’ -Cyberbullying
lead ▪ learn ▪ protect ▪ engage ‘The Digital Darkness’ – pupil motivations NSPCC Report sourcesforprofessionals/sexualab use/sexting- research_wda89260.html sourcesforprofessionals/sexualab use/sexting- research_wda89260.html 55% of year old internet users say they find it easier to be themselves online. EU Kids Online Oct 2012 The problems posed by sexting come from their peers – from ‘friends’ in their social networks. This means much of the typical advice about being careful who you contact, or keeping your profile private misses the point.... often coercive, linked to harassment, bullying and even violence.
lead ▪ learn ▪ protect ▪ engage What am I doing? Watch Jigsaw video from Think U Know ‘The Digital Darkness’ pupil motivations
lead ▪ learn ▪ protect ▪ engage What are your priorities? Consider Ofsted Consider trends Consider risks Consider your learners / parents
lead ▪ learn ▪ protect ▪ engage Break
lead ▪ learn ▪ protect ▪ engage Developing an e-safety curriculum What do you do already? safety?utm_source=Teachers+Media+List&utm_campaign=6cae4 f0a71- _14_Jan_2013&utm_medium=
lead ▪ learn ▪ protect ▪ engage Developing an e-safety curriculum What do you do already?
lead ▪ learn ▪ protect ▪ engage Key features of Outstanding and Good practice (Ofsted 2012) A progressive curriculum that is flexible, relevant and engages pupils interest; that is used to promote e-Safety through teaching pupils how to stay safe, how to protect themselves from harm and how to take responsibility for their own and others safety. Positive sanctions are used to reward positive and responsible use. Peer mentoring programmes. Developing an e-safety curriculum Safety Collaborating Effectiveness and Evaluation ©Copyright
lead ▪ learn ▪ protect ▪ engage Developing an e-safety curriculum
lead ▪ learn ▪ protect ▪ engage The new Computing POS At the end of key stage one: Use technology safely and respectfully, keeping personal information private. Know where to go for help and support when they have concerns about content or contact on the internet or other online material. At the end of key stage two: Use technology safely, respectfully and responsibly; recognise acceptable/unacceptable behaviour, identify a range of ways to report concerns and inappropriate behaviour.
lead ▪ learn ▪ protect ▪ engage At the end of key stage one: recognise common uses of information technology beyond school use technology purposefully to retrieve digital content At the end of key stage two: understand computer networks including the internet; how they can provide multiple services, such as the world wide web; and the opportunities they offer for communication and collaboration use search technologies effectively, appreciate how results are selected and ranked, and be discerning in evaluating digital content The new Computing POS
lead ▪ learn ▪ protect ▪ engage Frame your question THEN choose your key words Questions: What is Harry Styles’ favourite colour? My cat has blisters on its tongue – what’s wrong with it? What’s the name of that thing below your nose and above your lip? Technology in our lives – digital literacy
lead ▪ learn ▪ protect ▪ engage Technology in our lives – digital literacy
lead ▪ learn ▪ protect ▪ engage Know the author Know the history Know the validity Technology in our lives – digital literacy
lead ▪ learn ▪ protect ▪ engage Site%20Pages/Computing%20Curriculum%20Pri mary/Technology_in_our_lives.aspx Technology in our lives – digital literacy
lead ▪ learn ▪ protect ▪ engage Lunch
lead ▪ learn ▪ protect ▪ engage Indicators of inadequate practice Personal data is often unsecured and/or leaves school site without encryption. Password security is ineffective - passwords are shared or common with all but the youngest children. Policies are generic and not updated. There is no progressive, planned E-Safety education across the curriculum, for example there is only an assembly held annually. There is no internet filtering or monitoring. There is no evidence of staff training. Children are not aware of how to report a problem. e-safety – whole school picture
lead ▪ learn ▪ protect ▪ engage e-safety – whole school picture
lead ▪ learn ▪ protect ▪ engage e-safety – whole school picture SafetyNet 4 Managing Internet filtering in your school. ‘Where the provision for e-safety was outstanding, the schools had managed rather than locked down systems. In the best practice seen, pupils were helped, from a very early age, to assess the risk of accessing sites and therefore gradually to acquire skills which would help them adopt safe practices even when they were not supervised.’ (Page 8, The Safe Use of New Technologies – Ofsted Ref No ).
lead ▪ learn ▪ protect ▪ engage Working with parents
lead ▪ learn ▪ protect ▪ engage Data Protection School practices with technology Protecting your professional identity Protecting yourself from bullying Developing your knowledge – professional responsibility
lead ▪ learn ▪ protect ▪ engage uk/enforcement/un dertakings.aspx Developing your knowledge – personal data
lead ▪ learn ▪ protect ▪ engage Photos of children with allergies Teacher mark book Photos of school trips / events IEPs School reports Parents’ phone numbers What kinds of data does the school keep about children? Where is it kept? What kind of security measures are there? What kind of data does the school have about you? Developing your knowledge – personal data
lead ▪ learn ▪ protect ▪ engage Developing your knowledge – school practices with technology Mobile phones Locking screens Using memory sticks Strong passwords Acceptable use policies – staff and visitors Use of Use of school laptop Using an iPad
lead ▪ learn ▪ protect ▪ engage Developing your knowledge – protecting professional identity
lead ▪ learn ▪ protect ▪ engage The New Standards for Teachers (September 2012) Part 2: Personal and Professional Conduct A teacher is expected to demonstrate consistently high standards of personal and professional conduct. Teachers must have proper and professional regard for the ethos, policies and practices of the school in which they teach, and maintain high standards in their own attendance and punctuality. Teachers must have an understanding of, and always act within, the statutory frameworks which set out their professional duties and responsibilities.
lead ▪ learn ▪ protect ▪ engage Physical Safety Psychological Safety Reputational and legal safety Identity, property and community safety Freedom from physical harm Freedom from cruelty, harassment and exposure to potentially harmful material Freedom from unwanted social, academic, professional and legal consequences that might affect you for a lifetime Freedom from theft of identity and property and attacks against networks and online communities at local, national and international level
lead ▪ learn ▪ protect ▪ engage Developing your knowledge – protecting professional identity
lead ▪ learn ▪ protect ▪ engage How do you use the Internet socially? How do you share information about yourself? Do you know what your online reputation is? What would you do if people.co.uk Spezify Google Developing your knowledge – protecting professional identity
lead ▪ learn ▪ protect ▪ engage Developing your knowledge – protecting professional identity
lead ▪ learn ▪ protect ▪ engage Check the terms of service! “Content submitted to or through the Services available to other companies, organizations or individuals who partner with Vine for the syndication, broadcast, distribution or publication of such Content on other media and services, subject to our terms and conditions for such Content use. Such additional uses by Vine, or other companies, organizations or individuals who partner with Vine, may be made with no compensation paid to you “ ok.com/policies/ Your photos and profile pictures may be used to advertise products to other users. Facial recognition tagging using profile pics not allowed in EU. August changes to Facebook T&C The price of entry to free social networks is the use of your data. “This license is you authorizing us to make your Tweets available to the rest of the world and to let others do the same.”
lead ▪ learn ▪ protect ▪ engage Reduce vulnerability Manage visibility Caution in the subjects you discuss Let your colleagues know your expectations Learn how to set privacy settings eg Facebook Do you have a legacy? Limit social networking search results Google your own name or use Spezify, 123 people Limit SN site Google searches Compromise your professional identity Inappropriate site membership Discussing pupils, parents or colleagues on publicly available sites Tagging staff outings Avoid embarrassing wall posts and let colleagues know you will not respond funnies on official
lead ▪ learn ▪ protect ▪ engage Developing your knowledge – protecting yourself from bullying
lead ▪ learn ▪ protect ▪ engage
e-safety in the Primary Classroom SWGfL e-Safety Live th February 2014 Safer Internet Day 2014 Tuesday 11th February 2014 Take the Somerset e-Pledge
lead ▪ learn ▪ protect ▪ engage e-safety in the Primary Classroom Have you built your confidence in using technology to...? Provide excellent educational experiences Generate high levels of engagement and commitment to learning Help learners acquire knowledge and develop understanding across the curriculum Evaluation: