Esafety
This presentation is the property of its rightful owner.
Sponsored Links
1 / 50

eSAFETY PowerPoint PPT Presentation


  • 105 Views
  • Uploaded on
  • Presentation posted in: General

eSAFETY. Jenni Spencer Children’s safeguarding quality assurance unit CSF. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life. ‘DIGITAL NATIVES’. INTERNET ACCESS.

Download Presentation

eSAFETY

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Esafety

eSAFETY

Jenni Spencer

Children’s safeguarding quality assurance unit

CSF


Digital natives

Children are ‘digital natives’

Exposed to ICT at an ever younger age.

ICT is embedded in reception classrooms and is a constant feature of school life

‘DIGITAL NATIVES’


Internet access

INTERNET ACCESS

  • Internet access and technology is becoming cheaper and CYP have increased access to internet

  • CYP spending increasing amounts of time online and sharing an ever widening range of images and personal information

  • Children are moving away from traditional media


The internet is good

THE INTERNET IS GOOD!

The internet provides children with;

  • Excellent opportunities for learning

  • Access to a wealth of information

  • The opportunity to socialise and communicate with friends and improve their confidence

  • The ability to develop hobbies and interests

  • The chance to play games, listen to music, watch videos and have fun!


Esafety

Socialise

Create

Learning

  • Search engines

  • Homework

  • Projects

  • Personal interest

  • Amazing facts

    The biggest library in the world

  • Email/chat

  • VoIP - Skype

  • Instant Messenger

  • Multi-user games

  • Social networks

    Brings people together

  • Blogs (web log)

  • Vlogs (video log)

  • Websites

  • Text & pictures

  • Music/photo/video

    Anyone can become a publisher


Cyp use of internet

CYP increasingly communicate via;

Mobile phone text messaging

VoIP/Skype

Games consoles offering internet and WiFi connections

CYP use of internet


Esafety

IM chat rooms( MSN)

Web logs

Image and video sharing sites (Flickr, You Tube)

Social networking sites (Bebo, MySpace, Facebook)


Different usage

Different usage

ADULTS

Mostly email & web for research

YOUNG PEOPLE

Interactive chat, IM, Music, Games, Blog


Adults often have anxieties about new media

Adults often have anxieties about new media…

Everything that’s already in the world when you’re born is just normal;


Esafety

“Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it …until it’s been around for about ten years when it gradually turns out to be alright really.”

Douglas Adams


Emerging issues

Emerging issues

  • Wifi- internet can be accessed wirelessly

  • Technologies are converging- gaming consoles (PSP, Nintendo, X box, DS) and mobile phones have broadband access.

  • Gaming sites, instant messaging sites (IM) and photo sharing technologies are merging and becoming components of larger social networking sites (SNS) which also contain personal profiles


What are the risks

WHAT ARE THE RISKS?


Http www youtube com watch v ioon2wr8bu

http://www.youtube.com/watch?v=-IOOn2wR8bU

Where’s Klaus?

13


Content

CONTENT

  • Exposure to inappropriate content e.g. content that is pornographic, hateful, violent, encourages activities that are dangerous or illegal or just age inappropriate

  • Extreme material Unsolicited receipt by CYP of emails containing links to pornography/child abuse images

  • Inaccurate content- YP unable to discern

  • Created Content- YP publish personal info


Commerce

COMMERCE

  • Blur between content & advertising

  • Junk or scam emails from unscrupuloustraders

  • Invasive programmes - adware/popups

  • CYP give out financial details including credit card details of parents

  • Children registering with gambling websites


Bbc news boy three buys car on internet

BBC NEWS - Boy, Three, Buys Car on Internet

Jack here bought a pink Nissan on an internet auction site

“A three-year-old boy has used his mother's computer to buy a £9,000 car on an internet auction site”

Jack’s parents only discovered their son's successful bid when they received a message from eBay about the Barbie pink Nissan Figaro.

Rachael Neal, 36, said her son:

“was quite good at using the computer”


Contact

CONTACT

  • Predatory adults (often posing as children) use discussion forums, chat rooms and social networking sites to make contact with and groom children to sexually exploit them

  • CYP encouraged to perform sexual acts via webcam or to witness an adult exposing themselves

  • Cyber bullying via mobile phone text, chat rooms, social networking sites


Culture

CULTURE

  • Young people may become involved in inappropriate or antisocial behaviour while using new technologies

  • CYP not just recipients of downloaded content but are active participants uploading content to a worldwide audience

  • Web 2.0 environments – young people publish detailed accounts of their personal lives, contact info, photos and videos oblivious to possible implications and the permanence of their profiles


Changing environments

Changing environments

WEB v 1.0

WEB v 2.0

Downloading

+ Uploading

Consuming

+ Creating

+ Personal

Corporate

+ Converged media

Separate media

+ Truly interactive

Static


Ceop strategic overview 2008 9

CEOP Strategic Overview 2008/9

  • Child exploitation and online protection centre (CEOP)-part of UK police,

  • Majority of children’s reports concern online grooming (89%)

  • Contact abuse (3%)

  • Image distribution (2%)

  • Increasing numbers children report being asked to perform sexual acts on line via webcam

  • Increase in number of abusive images online particularly abuse images of babies and very young children

  • Increase in violent and sadistic images

  • Increasing level of threatening behaviour used as part of grooming techniques


Bbc news man jailed after grooming girls

BBC News - Man Jailed After Grooming Girls

Police found Etheridge, a carpenter, had more than 200 indecent images of girls, aged 13 to 15, on his mobile phone and thousands more on his computer.

The court was told Etheridge offered mobile phone top-up vouchers to girls in return for them sending indecent images of themselves in messages.

Most worrying of all, he escalated from downloading internet images, to grooming girls to make their ownphotos and actually meeting a girl to carry out sexual acts.


Emerging risks

Emerging risks

  • Wifi-taking advantage of another persons (unsecured) wireless broadband connection to commit grooming and image offences

  • Integration of GPS technology into most new mobile phone models enables offenders to locate and track movements of CYP

  • Hacking plus Blackmail is emerging as a notable feature of grooming- offender hacks into YP’s social network homepage and sexualises existing photos and uses to blackmail YP to coerce them into interacting on webcam or meeting offline

  • Use of P2P platforms to send, share and order indecent images

  • Cyberbullying- YP create an online profile using details of a pupil or acquaintance and expose them to risk by inviting contact from unknown persons or even suspect online contacts (‘Pass the Pervert’)


How do we make children resilient

How do we make children resilient?


Esafety

  • Promote the positive/respond to the negative

  • Don’t be risk averse

  • Knowledge v Wisdom

  • Resilience to risks and knowledge of how to deal with them


How to stay safe online top tips for children

How to stay safe online Top tips for children

  • If anything online makes you feel scared or uncomfortable tell your carer

  • Only talk to people you know online

  • Make sure you keep your personal details private

  • Set your privacy levels to ‘Friends Only’

  • Do not send nasty messages or bully other people online

30


Esafety

  • If you get a nasty message or get sent anything that makes you feel uncomfortable, do not reply. Show it to your carer

  • Do not meet up with friends you have met online

  • Do not let others know your online password

  • Think carefully about what you say or publish online


Esafety

  • Never open an attachment unless it is from someone you know

  • Reject Bluetooth messages/pairing requests from unknown users/leave Bluetooth in undiscoverable mode

  • Use the Report Abuse button to report things that concern you


Managing e safety in schools

Managing e safety in schools


Esafety

  • Part of Staying Safe outcome of ECM

  • CSCB has an e safety sub group

  • e safety policy- part of school safeguarding pack

  • e safety contact officer- needs to be one in every school

  • e safety incident report form- to report all incidents concerning e safety to CSCB


School e safety policy

School e safety policy


E safety contact officer role and responsibility

E Safety Contact Officer- role and responsibility

  • e safetyawareness is raised and maintained within their school through dissemination/display of publicity material for children, parents and staff

  • All staff in school are aware of the e safety policy and procedure and that it is implemented and reviewed and updated on a regular basis

  • All staff know how to access e safety training and that sufficient numbers of staff attend

  • An e safety education is provided/signposted for children

  • e safety is promoted to parents and carers


Esafety

  • Pupils are clear about who they should report e safety concerns to within the setting

  • e safety incidents are responded to in an appropriate manner with appropriate action taken according to procedure

  • e safety issues are monitored and reported to management and other agencies where appropriate

  • a log of all e safety incidents is kept

  • support, information and advice is provided to staff and children within the setting


E safety incident report form description of incident

E-SAFETY INCIDENT REPORT FORM Description of incident

  • □ bullying or harassment (cyber bullying

  • □ deliberately bypassing security or access

  • □ hacking or virus propagation

  • □ racist, sexist, homophobic religious hate material

  • □ terrorist material

  • □ drug/bomb making material

  • □ child abuse images

  • □ on-line gambling

  • □ soft core pornographic material

  • □ illegal hard core pornographic material

  • □ other (please specify)


Nature of incident

Nature of incident

  • Deliberate access/Accidental access

    Did the incident involve material being;

    □ created□ viewed□ printed□ shown to others

    □ transmitted to others□ distributed

    Could the incident be considered as;

    □ harassment□ grooming□ cyber bullying□ breach of AUP


Action taken

Action taken

  • Child/young person/ Staff

  • □ incident reported to head teacher/senior manager

  • □ advice sought from Safeguarding and Social Care

  • □ referral made to Safeguarding and Social Care

  • □ incident reported to police

  • □ incident reported to social networking site

  • □ incident reported to IT

  • □ child’s parents informed

  • □ disciplinary action to be taken

  • □ child/young person debriefed

  • □ e-safety policy to be reviewed/amended


Resources for schools

Resources for schools


Esafety

  • www.thinkuknow.co.uk


  • Login