BUCKHOLME TOWERS SCHOOL AND NURSERY - E-Safety Policy

This policy relates to the main school, EYFS and all activities, including residential trips and all care arrangements.

Introduction

Computing in the 21st Century is seen as an essential resource to support learning and teaching, as well as playing an important role in the every-day lives of children, young people and adults. Consequently, schools need to build in the use of these technologies in order to arm our children with the skills to access life-long learning and employment.

Computing covers a wide range of resources including web-based and mobile learning. It is also important to recognise the constant and fast paced evolution of Computing within our society as a whole. Currently the internet technologies children and young people are using both inside and outside of the classroom include:-

  • Websites
  • Learning platforms and virtual learning environments
  • Email and internet messaging
  • Chat rooms and social networking
  • Blogs and wikis
  • Podcasting
  • Video broadcasting
  • Music downloading
  • Gaming
  • Mobile/smart phones with text, video and or web functionality
  • Other mobile devices with web functionality

Whilst exciting and beneficial both in and out of the context of education, much Computing, particularly web-based resources, are not consistently policed. All users need to be aware of the range of risks associated with the use of these internet technologies.

At Buckholme Towers we understand the responsibility to educate our pupils in e-Safety issues; teaching them to remain safe and legal when using the internet and related technologies, in and beyond the context of the classroom.

This policy is inclusive of both fixed and mobile internet technologies provided by the school (such as laptops, iPads, whiteboards, digital video equipment etc) and technologies owned by the staff but brought on to the school premises (such as iPads, mobile phones, smartphones). Pupils are not permitted to bring any such equipment to school. If a phone is needed after the school day then it must be handed in at the office on arrival.

Pupils may however use home memory sticks at school when given permission by school staff.

Roles and responsibilities

As e-Safety is an important aspect of strategic leadership within the school, the Head and Proprietors have ultimate responsibility to ensure that the policy and practices are embedded and monitored. The named e-Safety champion in our school is Mr Ian Roberts. All members of the school community have been made aware of who holds the post. It is the role of the e-safety co-ordinator to keep abreast of current issues and guidance.

The e-Safety co-ordinator updates senior management and they have an understanding of the issues at our school in relation to local and national guidelines and advice.

Writing and reviewing the e-Safety Policy

This policy, supported by the school’s Acceptable User Agreement for staff, proprietors, visitors and pupils, is to protect the interests and safety of the whole school community. It is linked to our policies covering Computing (home school agreements) Behaviour, Bullying, Health & Safety, Safeguarding and PSHE.

Our e-Safety policy has been written by the school in conjunction with advice and guidance from the local authority. It has been agreed by the senior management team and staff. The e-Safety policy and its implementation will be reviewed annually. Parents have the opportunity to comment on the draft policy and to be part of general discussion following access to relevant information.

E-Safety skills development for staff

  • Our staff receive regular information and training on e-Safety issues.
  • All staff have been made aware of individual responsibilities relating to the safeguarding of children within the context of e-Safety and know what to do in the event of misuse of technology by any member of the school community.
  • New staff receive information on the school’s Acceptable Use Agreement as part of their induction.
  • All staff are encouraged to incorporate e-Safety activities and awareness within their lessons.

E-Safety information for parents/carers

  • Parents/carers are asked to read through and sign the Acceptable Use Agreement on behalf of their child.
  • Parents/carers are required to make a decision as to whether they consent to images of their child being taken/used on the school website.
  • The school website contains useful information and links to sites like Thinkuknow, Childline, CEOP and the CBBC website-Stay Safe page.
  • The school will send out the relevant e-Safety information through newsletters, the school website and the school prospectus.
  • The school will provide opportunities for parents to discuss safety issues.

TEACHING AND LEARNING

In order for the internet to enhance learning

  • The school will provide the opportunities within a range of curriculum areas to teach e-Safety.
  • Educate pupils on the dangers of technologies that may be encountered outside school informally when opportunities arise and as part of the e-Safety curriculum.
  • Make pupils aware of the impact of online bullying and know how to seek help if these issues affect them. All pupils are also aware of where to seek advice or help if they experience problems when using the internet and related technologies ie parent/carer, teacher/trusted member of staff or an organisation such as Childline or CEOP.
  • The school internet access will be designed expressly for pupil use and will include filtering appropriate to the age of pupils.
  • Pupils will be taught what internet use is acceptable and what is not and given clear objectives for internet use.
  • Pupils will be educated in the effective use of the internet in research, including the skills of knowledge location, retrieval and evaluation.

See APPENDIX 1 re use and misuse of technology.

Pupils will be taught how to evaluate internet content

  • The school will ensure that the use of internet derived materials by staff and pupils complies with copyright law.
  • Pupils should be taught to be critically aware of the materials they find and shown how to validate information before accepting its accuracy.

MANAGING INTERNET ACCESS

Information system security

The internet is an open communication medium, available to all, at all times. Anyone can view information, send messages, discuss ideas and publish material, which makes it both an invaluable resource for education, business and social interaction, as well as a potential risk to young and vulnerable people.

  • School ICT systems capacity and security will be reviewed regularly.
  • Virus protection will be updated regularly.
  • Security strategies will be discussed regularly.

Email use within school

  • Pupils may only use approved e-mail accounts on the school system.
  • Pupils must immediately tell a teacher if they receive offensive e-mail.
  • Pupils must not reveal personal details of themselves or others in e-mail communication or arrange to meet anyone without specific permission and if permission is given then the pupils would be accompanied by an adult.
  • E-mail sent to an external organisation should be written carefully and authorised before sending, in the same way as a letter written on school headed paper.
  • The forwarding of chain letters is not permitted.
  • Pupils may not e-mail staff. From home they should e-mail their own school address.

Published content and the school website

The contact details on the website should be the school address, e-mail and telephone number. Staff or pupils’ personal information will not be published. The Headmaster will take overall editorial responsibility and ensure that content is accurate and appropriate.

Publishing pupil’s images and work

  • Written permission from parents or carers will be obtained before photographs of pupils are published on the school website. This consent form is considered valid for the entire period that the child attends this school unless there is a change in the child’s circumstances where the consent could be an issue.
  • Parents/carers may withdraw permission in writing at any time.
  • Photographs that include pupils will be selected carefully.
  • Pupils full names will not be issued anywhere on the school website, particularly in association with photographs.
  • Pupils work can only be published by outside agencies with the permission of the pupil and parents.

Photographs taken by parents/carers for personal use

In the event of parents/carers wanting to take photographs for their own personal use, the school will demonstrate our protective ethos by announcing that photographs taken are for private retention and not for publication in any manner.

Social networking and personal publishing

  • The school will block/filter access to social networking sites.
  • Newsgroups will be blocked unless a specific use is approved.
  • Pupils are advised to set and maintain profiles on such sites to maximum privacy and deny access to any unknown individuals.
  • Our pupils are asked to report any incidents of bullying to the school.
  • School staff are advised not to add children as “friends” if they use these sites.
  • Pupils and parents will be advised that the use of social network spaces outside school brings a range of dangers for primary aged pupils and only moderated social networking sites should be used for this age range. Parents will be informed about that the minimum age for accessing most well-known sites is 13.
  • Parents will be made aware of any child that is under the restricted age, using social media networks (i.e. Twitter, Facebook)

Managing filtering

  • The school will work with the local authority and the Internet Service Provider to ensure systems to protect pupils are reviewed and improved.
  • If pupils or staff discover an unsuitable site, it must be reported to the class teacher, Computing teacher or e-Safety co-ordinator.
  • Computing staff will ensure that regular checks are made to ensure that the filtering methods selected are appropriate, effective and reasonable.

Managing emerging technologies

  • Emerging technologies will be examined for educational benefit and a risk assessment will be carried out before its use in school is allowed.
  • The use of portable media such as memory sticks will be monitored closely as potential sources of computer virus and inappropriate material.
  • Pupils are not allowed to bring personal mobile devices/phones to school. Any phones that are brought to school will be sent to the school office and kept there until the end of the day.
  • The sending of abusive or inappropriate text messages outside school is forbidden.
  • Staff will use a school phone where contact with a pupil is required.

See APPENDIX 2 for useful advice.

Protecting personal data

The school will collect personal information about parents fairly and will let them know how the school will use it. The school will use information about pupils to further curriculum, professional and managerial activities in accordance with the business of the school and will contact the parents or guardians if it is necessary, to pass information beyond the school or education authority. For other members of the community the school will tell you in advance if it is necessary to pass the information on to anyone else other than the school or local authority.

The school will hold personal information on its systems for as long as you remain a member of the school community and hold it until it is no longer required for the legitimate function of the school. We will ensure that all personal information supplied is held securely, in accordance with the Data Protection Policy.

You have the right to view the personal information that the school holds about you and to have any inaccuracies corrected.

POLICY DECISIONS

Authorising internet access

Pupil instruction on safe use should precede any internet access and all pupils must sign up to the Acceptable Use Agreement (see class Welcome Pack) for pupils and abide by the school’s e-Safety rules.

  • Access to the internet will be directly supervised access to specific, approved on-line materials.
  • All parents will be asked to sign Acceptable Use Agreements for pupils giving consent for their child to use the internet in school by following the school’s e-Safety rules and within the constraints detailed in the school’s e-Safety policy.
  • All staff must read and agree in writing to adhere to the Acceptable Use Agreement for staff before using any Computing resource.

Password security

Adult users are provided with an individual network and email login username and password, which they are encouraged to change periodically.

  • All pupils are provided with an individual network username and a password.
  • Pupils are not allowed to deliberately access on-line materials or files on the school network, of their peers, teachers or others.
  • Staff are aware of their individual responsibilities to protect the security and confidentiality of the school network.

Assessing risks

The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the international scale and linked nature of internet content, it is not possible to guarantee that unsuitable material will never appear on a school computer. The school cannot accept liability for the material accessed or any consequences of internet access. The school will audit ICT provision to establish if the e-Safety policy is adequate and that its implementation is effective.

Handling e-Safety complaints

  • Complaints of internet misuse will be dealt with by the Head and the e-Safety Co-ordinator.
  • Deliberate access to inappropriate materials by any user will lead to the incident being logged by the e-Safety officer and recorded in the e-Safety incident logbook.
  • Any complaint about staff misuse must be referred to the Headmaster.
  • Complaints of a child protection nature must be dealt with in accordance with school child protection procedures.

Pupils and parents will be informed of the complaints procedure.COMMUNICATIONS POLICY

 Introducing the e-Safety policy to pupils

  • E-Safety rules will be discussed with the pupils throughout the year. Specific lessons will be taught by class teachers at relevant points throughout eg during PSHE lessons/circle times/anti bullying discussions.
  • Pupils will be informed that network and internet use will be monitored.

Staff and the e-Safety Policy

  • All staff will be given the school e-Safety Policy and its importance will be explained.
  • Any information downloaded must be respectful of copyright, property rights and privacy.
  • Staff should be aware that internet traffic could be monitored and traced to the individual user. Discretion and professional conduct is essential.
  • A laptop issued to a member of staff remains the property of the school. Users of such equipment should therefore adhere to school policy regarding appropriate use with regard to internet access, data protection and use of software both in and out of school.

MONITORING AND REVIEW

The policy is implemented on a day to day basis by all school staff and is monitored by the e-Safety Co-ordinator.

The policy is the Headmaster’s responsibility and they will review its effectiveness annually.

APPENDIX 1

How is Technology Used to Bully?

Technology can be used both positively and negatively.

Technology:

Great for:

Keeping in touch by voice or text, taking and sending pictures and film, listening to music, playing games, going online and sending emails. Useful in emergency situations and for allowing children a greater sense of independence. Text or voice chatting live with friends online. A quick and effective way of keeping in touch even while working on other things.

Groups of people around the world can text or voice chat live about common interests. For young people, this can be an easy way to meet new people and explore issues which they are too shy to talk about in person. Sending electronic letters, pictures and other files quickly and cheaply anywhere in the world. Bringing far-off places to life or video conferencing. Taking pictures or recording messages. Being able to see and talk to someone live on your computer screen. Socialising with your friends and making new ones within online communities. Allowing young people to be creative online, even publishing online music. Personalising homepages and profiles, creating and uploading content. Accessing useful educational, entertaining and original creative video content and uploading your own.

Examples of misuse:

Sending nasty calls or text messages, including threats, intimidation, and harassment. Taking and sharing humiliating images. Videoing other people being harassed and sending these to other phones or internet sites. Sending nasty messages or content. Using someone else’s account to forward rude or mean messages via their contacts list.

Sending nasty or threatening anonymous messages. Groups of people deciding to pick on or ignore individuals. Making friends under false pretences – people pretending to be someone they’re not in order to get personal information that they can misuse in a range of ways – e.g. by spreading secrets or blackmailing. Sending nasty or threatening messages. Forwarding unsuitable content including images and video clips, or sending computer viruses. Accessing someone else’s account, e.g. to forward personal emails or delete emails.

Making and sending inappropriate content. Persuading or threatening young people to act in inappropriate ways. Using inappropriate recordings to manipulate young people.

Posting nasty comments, humiliating images / video.

Accessing another person’s account details and sending unpleasant messages, deleting information or making private information public. Groups of people picking on individuals by excluding them. Creating fake profiles to pretend to be someone else, e.g. to bully, harass or get the person into trouble. Posting embarrassing, humiliating film of someone.

Posting inappropriate messages or images. Hacking into someone else’s account to post inappropriate comments or delete schoolwork.

APPENDIX 2

When and How to Contact the Service Provider

Mobile phones

All UK mobile phone operators have nuisance call centres set up and / or procedures in place to deal with such instances. They may be able to change the number of the person being bullied. Mobile operators cannot bar a particular number from contacting a phone, but some phone handsets do have this capacity. Action can be taken against the bully’s phone account (e.g. blocking their account) only with police involvement.

Contacts:

  • O2: ncb@o2.com or 08705214000.
  • Vodafone: 191 from a Vodafone phone or 08700700191 for Pay Monthly customers and 08700776655 for Pay as you Go.
  • Call 333 from a 3 phone or 08707330333.
  • Orange/EE: Call 450 on an Orange phone or 07973100450 for Pay as you Go, or 150 or 07973100150 for Pay Monthly.
  • T-Mobile: Call 150 on a T-Mobile phone or 08454125000.

Social networking sites (e.g., Facebook, Snapchat, Instagram, ooVoo)

It is good practice for social network providers to make reporting incidents of cyberbullying easy, and thus have clear, accessible and prominent reporting features. Many of these reporting features will be within the profiles themselves, so they are ‘handy’ for the user. If social networking sites do receive reports about cyberbullying, they will investigate and can remove content that is illegal or breaks their terms and conditions in other ways. They can delete the accounts of those who have broken the rules.

Video-hosting sites

It is possible to get content taken down from video-hosting sites, though the content will need to be illegal or have broken the terms of service of the site in other ways. On YouTube, perhaps the most well-known of such sites, it is possible to report content to the site provider as inappropriate. In order to do this, you will need to create an account (this is free) and log in, and then you will have the option to ‘flag content as inappropriate’. The option to flag the content is under the video content itself. YouTube provides information on what is considered inappropriate in its terms of service. See www.youtube.com/t/terms section 5C.

Instant Messenger (e.g. Windows Live Messenger or MSN Messenger)

It is good practice for Instant Messenger (IM) providers to have visible and easy-to-access reporting features on their service. Instant Messenger providers can investigate and shut down any accounts that have been misused and clearly break their terms of service. The best evidence for the service provider is archived or recorded conversations, and most IM providers allow the user to record all messages.

Contacts of some IM providers:

  • MSN: When in Windows Live Messenger, clicking the ‘Help’ tab will bring up a range of options, including ‘Report Abuse’ and there is also an

online feedback form at:

http://support.msn.com/default.aspx?mkt=en-gb to report on a range of products including MSN Messenger.

  • Yahoo!: When in Yahoo! Messenger, clicking the ‘Help’ tab will bring up a range of options, including ‘Report Abuse’.

Chatrooms, individual website owners / forums, message board hosts - It is good practice for chat providers to have a clear and prominent reporting mechanism to enable the user to contact the service provider. Users that abuse the service can have their account deleted. Some services may be moderated, and the moderators will warn users posting abusive comments or take down content that breaks their terms of use.

Reviewed September 2016