E-Safety and Acceptable Use...

9
Birkbeck Primary School Acceptable Use & Internet Safety Policy February 2017 To be reviewed February 2018

Transcript of E-Safety and Acceptable Use...

Page 1: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

Birkbeck Primary School

Acceptable Use

&

Internet Safety Policy

February 2017

To be reviewed February 2018

Page 2: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

Birkbeck Primary School Acceptable Use and Internet Safety Policy

Introduction

At Birkbeck Primary School we are committed to providing a caring, friendly and safe environment

for all of our pupils so they can learn in a relaxed and secure atmosphere. We believe every pupil

should be able to participate in all school activities in an enjoyable and safe environment and be

protected from harm. This is the responsibility of every adult employed by, or invited to deliver

services at, Birkbeck Primary School. We recognise our responsibility to safeguard and promote the

welfare of all our pupils by protecting them from physical, sexual or emotional abuse, neglect and

bullying.

The Internet is used to help to raise educational standards, promote pupil achievement, support the

professional work of staff and to enhance the school’s management information and administration

systems

Why is the internet important?

Internet use is part of the statutory curriculum. It is an essential element of 21st century life. Access

to the Internet is an entitlement, but pupils need to show a responsible and mature approach to its

use. We have a duty to provide pupils with quality Internet access.

E-Safety

E-Safety takes in both Internet technologies and electronic communications such as mobile phones

and wireless technology. It highlights the need to make children aware of both the the benefits and

risks of new technology. It provides the safeguards they need and enables us to control their online

experiences.

• E-Safety depends on effective practice at a number of levels: Responsible ICT use by all staff and pupils; encouraged by education and made explicit through published policies.

• Sound implementation of e-safety policy in both administration and curriculum, including secure school network design and use.

• Safe and secure broadband from the London Grid for Learning including the effective management of content filtering.

How will the school ensure Internet use provides effective learning?

• Pupils using the Internet will be supervised appropriately

• Pupils will be given clear objectives for Internet use;

• Pupils will be provided with lists of relevant and suitable web sites;

• Pupils will be informed of their responsibilities;

• Pupils will be informed that checks can be made on files held on the system;

• Curriculum planning will identify opportunities to enrich and extend learning activities via access to the Internet.

• Internet access will be purchased through the LA, which provides a firewall that filters out inappropriate sites

• The school will work with the LA to ensure systems to protect pupils are regularly reviewed and improved.

How can Internet Use enhance learning?

Page 3: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

Internet access will be designed expressly for pupil use and includes filtering appropriate to the age

of pupils. Pupils will be taught what Internet use is acceptable and what is not and given clear

objectives for Internet use. Internet access will be planned to enrich and extend learning activities.

Staff should guide pupils in on-line activities that will support learning outcomes planned for the

pupils’ age and maturity. Pupils will be educated in the effective use of the Internet in research,

including the skills of knowledge location, retrieval and evaluation.

How will pupils be taught to assess Internet content?

ICT teaching in Year 6 will incorporate Internet content issues, for instance the value and credibility

of Web materials in relationship to other media.

Pupils in KS2 will be taught to validate information from the web before accepting it as true, and to

discriminate between fact and opinion.

Children will be encouraged to use the Internet to enhance rather than replace existing methods of

research

When copying materials from the Web, pupils will observe copyright;

• Pupils will be made aware that the writer of an E-mail or the author of a Web page may not be the person claimed;

• Pupils will be encouraged to tell a teacher immediately if they encounter any material that makes them feel uncomfortable.

How will Internet access be authorized?

• Internet access is a necessary part of the statutory curriculum.

• It is an entitlement for children based on responsible use.

• The school will maintain a current record of all staff and pupils who are granted Internet access.

• All staff must read and sign the ‘Acceptable ICT Use Agreement’ before using any school ICT resource.

• Parents will be informed that students will be provided with monitored Internet access.

• Children and staff must agree to the Acceptable Use Policy before they are given access to the Internet.

• Staff passwords will be removed when access is no longer required, or is withdrawn.

This policy will be made available to parents on request

How will the School ensure Internet access is safe?

• Staff and children will be informed that Internet use will be monitored

• A member of staff will regularly monitor Internet logs to ensure that appropriate sites are being visited to ensure compliance with the Internet Access Policy.

• If staff or pupils discover unsuitable sites, the URL (address), time, content must be reported to the Local Authority helpdesk via the e-safety coordinator or network manager.

• School will ensure that the use of Internet derived materials by pupils and staff complies with copyright law.

• Pupils will be taught to be critically aware of the materials they are shown and how to validate information before accepting its accuracy.

• The school reserves the right to remove access to any website it considers inappropriate

• The school will work in partnership with parents; the LA and the DFE to ensure systems to protect children are reviewed and improved.

Page 4: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

• The school will ensure that regular checks are made to ensure that the filtering methods selected are effective in practice

• If staff or children discover unsuitable sites, the URL (address) and content will be reported to the borough ICT Support team via the ICT co-ordinator

• Any material that the school suspects is illegal will be referred to the appropriate authorities immediately.

The Internet is a communications medium that is freely available to any person wishing to publish a

Website with no editorial intervention. While access to appropriate information should be

encouraged, students will generally need protected access to the Internet and the school will do its

utmost to ensure this.

How will E-mail be managed?

• Pupils are expected to use E-mail as part of the National Curriculum

• Pupils may send E-mail as part of planned lessons, using class email addresses as part of software packages controlling E-mail security.

• Emails to persons and organizations made as part of planned lessons will be checked to ensure appropriate educational use and that the good name of the school is maintained;

• The forwarding of chain letters will be banned;

Social Networking

• We will block/filter access to social networking sites and newsgroups unless a specific use is approved.

• Pupils will be advised never to give out personal details of any kind which may identify them or their location

• Pupils will be advised not to place personal photos on any social network space.

• Pupils will be advised on security and encouraged to set passwords, deny access to unknown individuals and instructed how to block unwanted communications.

• Pupils should be encouraged to invite known friends only and deny access to others. Filtering

URL filtering is in place in school through the LGFL WebScreen 2.0 Filtering System.

Policies are applied to IP addresses or directly to users (per-user filtering) or via a combination of

the two methods. However, in order for per user filtering to be possible, each user must be

identifiable through a unique IP address. All surfing activity is logged. A variety of reports can be

generated. These depend on the type of filtering used.

Video Conferencing

Pupils must ask permission from the supervising teacher before making or answering a

videoconference call. Videoconferencing will be appropriately supervised for the pupils’ age.

Managing Emerging Technologies Emerging technologies will be examined for educational benefit and

a risk assessment will be carried out before use in school is allowed. Staff will be issued with a

school phone where contact with pupils is required.

Staff are to use school owned devices only for capturing, recording and storing data or photos of

children.

Published Content and the School Web Site

Page 5: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

The contact details on the Web site should be the school address, e-mail and telephone number.

Staff or pupils personal information will not be published. The Head Teacher or ICT Leader will take

overall editorial responsibility and ensure that content is accurate and appropriate.

Publishing Pupils’ Images and Work

Occasionally, we may wish to use photographs taken in school on our school website. Pupils’ full

names will not be used anywhere on the Web site or Blog in association with photographs. Written

permission from parents or carers will be obtained before photographs of pupils are published on

the school Web site.

Information System Security

School ICT systems capacity and security will be reviewed regularly. Virus protection will be

installed and updated regularly. Security strategies will be discussed with the Local Authority.

Protecting Personal Data Personal data will be recorded, processed, transferred and made available

according to the Data Protection Act 1998.

Assessing Risks

The school will take all reasonable precautions to prevent access to inappropriate material.

However, due to the international scale and linked Internet content, it is not possible to guarantee

that unsuitable material will never appear on a school computer. Neither the school nor Bexley LA

can accept liability for the material accessed, or any consequences of Internet access.

The school will audit ICT use to establish if the e-safety policy is adequate and that the

implementation of the e-safety policy is appropriate.

E-safety in School

E-Safety is defined as ‘Electronic Safety’ and encompasses not only the use of the Internet, but also any electronic devices which may be used within the school community (Games consoles, mobile devices, tablets, laptops etc.). At Birkbeck Primary School, we believe that computing is a valuable tool to support all children’s learning (either extending or supporting) and they have the right to use these tools in a safe environment. E-Safety encompasses Internet technologies and electronic communications such as mobile phones and wireless technology. It highlights the need to educate children and young people about the benefits and risks of using new technology and provides safeguards and awareness for users to enable them to control their online experiences. The school’s e-safety policy will operate in conjunction with other policies including those for Pupil Behaviour, Bullying, Curriculum, Data Protection and Computing. Review dates and monitoring It will be the responsibility of all users to ensure this E-safety policy is followed. However, regular monitoring of the delivery of E-Safety education is to be carried out by the Computing Coordinators on a half termly basis through:

• Planning Scrutinies

• Lesson Observations

• Interviews with pupils

Page 6: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

This monitoring is to be shared with the School’s Governors, Headteacher, Business Manager, Senior Leadership Team and class teachers. This information will be built upon and issues identified. This policy will be reviewed in 1 year and will incorporate any new developments in technology, resources or staffing. Roles and Responsibilities Each of the following parties has a crucial role to play in the implementation and monitoring of E-safety within Birkbeck Primary School. Specific roles to be identified below: School Governors:

• Review this E-Safety policy and discuss any issues with the Computing Coordinator

• Have regular meetings with the Computing Coordinator regarding the implementation of this policy and discussing any reports of E-Safety misuse

• Appoint an E-Safety Officer (member of Governing Body) who will take the lead in any discussions regarding E-safety issues/updates

Head Teacher/ Deputy Head Teacher

• Have duty of care for overall implementation and delivery of E-Safety policy

• Liaise with Computing Coordinator and E-Safety Officers on regular basis

• Follow regulations and procedures when E-Safety related allegations are made

• Log reports accurately and communicate with relevant parties with regards to these reports

• Allow CPD opportunities for Governors, Staff and community members

• Link on the school website to the Child Exploitation and Online Protection Centre (CEOP) for reporting E-safety or safeguarding concerns.

Computing Coordinators

• Responsible for E-Safety Policy updates

• Delivery of E-Safety education as a whole school

• Monitor delivery of E-Safety education within year groups and across Key Stages

• Provide CPD of E-Safety updates to all parties within the school community

• Liaise with Local Authority Cluster Schools, technical staff (ATS) and School Business Manager.

• Receive copies of reports made to Head Teacher/Deputy Head Teacher/E-Safety Officer regarding allegations of E-Safety abuse.

• Involve wider school community (parents/carers/parents forum) with E-Safety updates and policies.

• Responsible for day to day monitoring of E-Safety issues and lead role in establishing E-Safety policies.

Parents/Carers:

• Work collaboratively with school to ensure consistency of E-Safety guidelines

• Inform staff of any breaches of the E-Safety guidelines outside of school and be ultimately responsible for misuse of electronic equipment by children inside the home environment.

• Attend CPD/Parent Information assemblies/sessions within school to ensure they are up to date with new guidelines or to query existing regulations

• Provide children with a safe environment for using electronic equipment within the home setting as to support their computing competence independently and with guidance.

Page 7: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

Pupils:

• Follow school rules with regard to Eencounter any breaches of these rules

• Report issues to an appropriate adult

• Apply school’s E-Safety policy when working in the home environment (parents to support) and report any misuse of

• KS1 Pupils use the Lee and Kim Story from the CEOP website four rules to internet safety

• https://www.thinkuknow.co.uk/5_7/leeandkim/

• KS2 Pupils use the KidSmart I

• http://www.kidsmart.org.uk/beingsmart/

• Keep evidence of allegations of misuse (printouts ,print screens, emails, photos etc.) to use as evidence in all cases.

Community:

• Any member of the local community who enters to follow the regulations stated in this E

• Any allegations of misuse of electronic equipment by pupils of witnessed by a member of the local community, are to be reported to ETeacher, Business Managrecorded following the procedures in this policy. Likewise, if any members of the school community (pupils, teachers etc) witness such breaches of this policy in the local community, they are to report this to the appropriate parties (as aforementioned). Any serious cases of misuse are to be reported to the police.

es with regard to E-Safety and know procedures if they witness or encounter any breaches of these rules

Report issues to an appropriate adult

Safety policy when working in the home environment (parents to support) and report any misuse of electronic equipment to an adult and school

Lee and Kim Story from the CEOP website four rules to internet safety

https://www.thinkuknow.co.uk/5_7/leeandkim/

KS2 Pupils use the KidSmart Internet Safety Rules

http://www.kidsmart.org.uk/beingsmart/

Keep evidence of allegations of misuse (printouts ,print screens, emails, photos etc.) to use

Any member of the local community who enters Birkbeck Primary Schoolto follow the regulations stated in this E-Safety policy.

Any allegations of misuse of electronic equipment by pupils of Birkbeck Primary Schoolwitnessed by a member of the local community, are to be reported to ETeacher, Business Manager or Computer Coordinator. This will then be followed up and recorded following the procedures in this policy. Likewise, if any members of the school community (pupils, teachers etc) witness such breaches of this policy in the local community,

report this to the appropriate parties (as aforementioned). Any serious cases of misuse are to be reported to the police.

Safety and know procedures if they witness or

Safety policy when working in the home environment (parents to support)

Lee and Kim Story from the CEOP website four rules to internet safety

Keep evidence of allegations of misuse (printouts ,print screens, emails, photos etc.) to use

Birkbeck Primary School will be required

Birkbeck Primary School, -Safety officer, Head

er or Computer Coordinator. This will then be followed up and recorded following the procedures in this policy. Likewise, if any members of the school community (pupils, teachers etc) witness such breaches of this policy in the local community,

report this to the appropriate parties (as aforementioned). Any serious cases of

Page 8: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

How will incidents be handled?

The management of the acceptable use of the Internet in school is achieved by ensuring that:

• Protection software installed on the computers

• Acceptable Use Policy adopted by the school

• A range of procedures for infringements of the policy is in place

• Whenever a child or staff member infringes the policy, the final decision on the level of sanction will be at the discretion of the Head Teacher and / or Senior Management Team.

Handling E-safety Complaints

Complaints of Internet misuse will be dealt with by a senior member of staff. Any complaint about

staff misuse must be referred to the Head Teacher. Complaints of a child protection nature must be

dealt with in accordance with school child protection procedures. Pupils and parents will be

informed of the complaints procedure. Discussions will be held with the Police Youth Crime

Reduction Officer to establish procedures for handling potentially illegal issues.

Infringements (in order of severity) Children

• Use of non-educational sites during lessons

• Unauthorised use of email

• Attempting to use or use of chatrooms, newsgroups or social networking sites.

• Continual use of non-educational sites during lessons after being warned

• Unauthorised use of email after being warned

• Accidentally accessing offensive material and not logging off or notifying a member of staff of it

• Deliberately corrupting or destroying others' data,

• Any purchasing or ordering of items over the internet

• Bringing the school name into disrepute

• Suggested Sanctions:

• Head teacher informed

• Parents informed

• Internet access withdrawn

• Staff Category A Infringements

• Use of Internet for personal activities during lesson time.

• Use of Internet to access chatrooms and social networking sites.

Teaching Staff

• Use of internet for personal activities between the hours of 8.00 am and 4.30 pm, with the exception of lunch break.

• All other staff

• Use of internet for personal activities during paid working hours.

Sanctions:

• Verbal reminder by Head Teacher

• Formal written warning from head teacher informing staff member that Internet access will be withdrawn Category B infringements

• Continued use of Internet for personal activities during lesson time

• Deliberately accessing, downloading and disseminating any material deemed offensive, obscene, defamatory, racist, homophobic or violent

Page 9: E-Safety and Acceptable Use Policyfluencycontent2-schoolwebsite.netdna-ssl.com/FileCluster/...Birkbeck Primary School Acceptable Use and Internet Safety Policy Introduction At Birkbeck

• Receipt or transmission of material that infringes the copyright of another person or infringes the conditions of the Data Protection Act, revised 1988

• Bringing the school name into disrepute Sanction: Internet Access withdrawn. How will staff and children be informed?

• Rules for Internet access will be posted near computer systems.

• All staff will be provided with the Internet Access Policy, and its importance explained.

• The policy will be made available to parents on request The issue of responsible use of the Internet will be addressed during the teaching of ICT in Year 6. Staff are expected and required to inform the Headteacher or a member of the SMT of any infringements as listed above.