1 / 50

eSAFETY

eSAFETY. Jenni Spencer Children’s safeguarding quality assurance unit CSF. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life. ‘DIGITAL NATIVES’. INTERNET ACCESS.

dallon
Download Presentation

eSAFETY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. eSAFETY Jenni Spencer Children’s safeguarding quality assurance unit CSF

  2. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life ‘DIGITAL NATIVES’

  3. INTERNET ACCESS • Internet access and technology is becoming cheaper and CYP have increased access to internet • CYP spending increasing amounts of time online and sharing an ever widening range of images and personal information • Children are moving away from traditional media

  4. THE INTERNET IS GOOD! The internet provides children with; • Excellent opportunities for learning • Access to a wealth of information • The opportunity to socialise and communicate with friends and improve their confidence • The ability to develop hobbies and interests • The chance to play games, listen to music, watch videos and have fun!

  5. Socialise Create Learning • Search engines • Homework • Projects • Personal interest • Amazing facts The biggest library in the world • Email/chat • VoIP - Skype • Instant Messenger • Multi-user games • Social networks Brings people together • Blogs (web log) • Vlogs (video log) • Websites • Text & pictures • Music/photo/video Anyone can become a publisher

  6. CYP increasingly communicate via; Mobile phone text messaging VoIP/Skype Games consoles offering internet and WiFi connections CYP use of internet

  7. IM chat rooms( MSN) Web logs Image and video sharing sites (Flickr, You Tube) Social networking sites (Bebo, MySpace, Facebook)

  8. Different usage ADULTS Mostly email & web for research YOUNG PEOPLE Interactive chat, IM, Music, Games, Blog

  9. Adults often have anxieties about new media… Everything that’s already in the world when you’re born is just normal;

  10. “Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it …until it’s been around for about ten years when it gradually turns out to be alright really.” Douglas Adams

  11. Emerging issues • Wifi- internet can be accessed wirelessly • Technologies are converging- gaming consoles (PSP, Nintendo, X box, DS) and mobile phones have broadband access. • Gaming sites, instant messaging sites (IM) and photo sharing technologies are merging and becoming components of larger social networking sites (SNS) which also contain personal profiles

  12. WHAT ARE THE RISKS?

  13. http://www.youtube.com/watch?v=-IOOn2wR8bU Where’s Klaus? 13

  14. CONTENT • Exposure to inappropriate content e.g. content that is pornographic, hateful, violent, encourages activities that are dangerous or illegal or just age inappropriate • Extreme material Unsolicited receipt by CYP of emails containing links to pornography/child abuse images • Inaccurate content- YP unable to discern • Created Content- YP publish personal info

  15. COMMERCE • Blur between content & advertising • Junk or scam emails from unscrupuloustraders • Invasive programmes - adware/popups • CYP give out financial details including credit card details of parents • Children registering with gambling websites

  16. BBC NEWS - Boy, Three, Buys Car on Internet Jack here bought a pink Nissan on an internet auction site “A three-year-old boy has used his mother's computer to buy a £9,000 car on an internet auction site” Jack’s parents only discovered their son's successful bid when they received a message from eBay about the Barbie pink Nissan Figaro. Rachael Neal, 36, said her son: “was quite good at using the computer”

  17. CONTACT • Predatory adults (often posing as children) use discussion forums, chat rooms and social networking sites to make contact with and groom children to sexually exploit them • CYP encouraged to perform sexual acts via webcam or to witness an adult exposing themselves • Cyber bullying via mobile phone text, chat rooms, social networking sites

  18. CULTURE • Young people may become involved in inappropriate or antisocial behaviour while using new technologies • CYP not just recipients of downloaded content but are active participants uploading content to a worldwide audience • Web 2.0 environments – young people publish detailed accounts of their personal lives, contact info, photos and videos oblivious to possible implications and the permanence of their profiles

  19. Changing environments WEB v 1.0 WEB v 2.0 Downloading + Uploading Consuming + Creating + Personal Corporate + Converged media Separate media + Truly interactive Static

  20. CEOP Strategic Overview 2008/9 • Child exploitation and online protection centre (CEOP)-part of UK police, • Majority of children’s reports concern online grooming (89%) • Contact abuse (3%) • Image distribution (2%) • Increasing numbers children report being asked to perform sexual acts on line via webcam • Increase in number of abusive images online particularly abuse images of babies and very young children • Increase in violent and sadistic images • Increasing level of threatening behaviour used as part of grooming techniques

  21. BBC News - Man Jailed After Grooming Girls Police found Etheridge, a carpenter, had more than 200 indecent images of girls, aged 13 to 15, on his mobile phone and thousands more on his computer. The court was told Etheridge offered mobile phone top-up vouchers to girls in return for them sending indecent images of themselves in messages. Most worrying of all, he escalated from downloading internet images, to grooming girls to make their ownphotos and actually meeting a girl to carry out sexual acts.

  22. Emerging risks • Wifi-taking advantage of another persons (unsecured) wireless broadband connection to commit grooming and image offences • Integration of GPS technology into most new mobile phone models enables offenders to locate and track movements of CYP • Hacking plus Blackmail is emerging as a notable feature of grooming- offender hacks into YP’s social network homepage and sexualises existing photos and uses to blackmail YP to coerce them into interacting on webcam or meeting offline • Use of P2P platforms to send, share and order indecent images • Cyberbullying- YP create an online profile using details of a pupil or acquaintance and expose them to risk by inviting contact from unknown persons or even suspect online contacts (‘Pass the Pervert’)

  23. How do we make children resilient?

  24. Promote the positive/respond to the negative • Don’t be risk averse • Knowledge v Wisdom • Resilience to risks and knowledge of how to deal with them

  25. How to stay safe online Top tips for children • If anything online makes you feel scared or uncomfortable tell your carer • Only talk to people you know online • Make sure you keep your personal details private • Set your privacy levels to ‘Friends Only’ • Do not send nasty messages or bully other people online 30

  26. If you get a nasty message or get sent anything that makes you feel uncomfortable, do not reply. Show it to your carer • Do not meet up with friends you have met online • Do not let others know your online password • Think carefully about what you say or publish online

  27. Never open an attachment unless it is from someone you know • Reject Bluetooth messages/pairing requests from unknown users/leave Bluetooth in undiscoverable mode • Use the Report Abuse button to report things that concern you

  28. Managing e safety in schools

  29. Part of Staying Safe outcome of ECM • CSCB has an e safety sub group • e safety policy- part of school safeguarding pack • e safety contact officer- needs to be one in every school • e safety incident report form- to report all incidents concerning e safety to CSCB

  30. School e safety policy

  31. E Safety Contact Officer- role and responsibility • e safetyawareness is raised and maintained within their school through dissemination/display of publicity material for children, parents and staff • All staff in school are aware of the e safety policy and procedure and that it is implemented and reviewed and updated on a regular basis • All staff know how to access e safety training and that sufficient numbers of staff attend • An e safety education is provided/signposted for children • e safety is promoted to parents and carers

  32. Pupils are clear about who they should report e safety concerns to within the setting • e safety incidents are responded to in an appropriate manner with appropriate action taken according to procedure • e safety issues are monitored and reported to management and other agencies where appropriate • a log of all e safety incidents is kept • support, information and advice is provided to staff and children within the setting

  33. E-SAFETY INCIDENT REPORT FORM Description of incident • □ bullying or harassment (cyber bullying • □ deliberately bypassing security or access • □ hacking or virus propagation • □ racist, sexist, homophobic religious hate material • □ terrorist material • □ drug/bomb making material • □ child abuse images • □ on-line gambling • □ soft core pornographic material • □ illegal hard core pornographic material • □ other (please specify)

  34. Nature of incident • Deliberate access/Accidental access Did the incident involve material being; □ created □ viewed □ printed □ shown to others □ transmitted to others □ distributed Could the incident be considered as; □ harassment □ grooming □ cyber bullying □ breach of AUP

  35. Action taken • Child/young person/ Staff • □ incident reported to head teacher/senior manager • □ advice sought from Safeguarding and Social Care • □ referral made to Safeguarding and Social Care • □ incident reported to police • □ incident reported to social networking site • □ incident reported to IT • □ child’s parents informed • □ disciplinary action to be taken • □ child/young person debriefed • □ e-safety policy to be reviewed/amended

  36. Resources for schools

  37. www.thinkuknow.co.uk

More Related