1 / 17

The e-Safety Agenda – Policies & Practice AUP, Risk Assessment and Learner Involvement Monday 11 th January 2010 Vi

The e-Safety Agenda – Policies & Practice AUP, Risk Assessment and Learner Involvement Monday 11 th January 2010 Virginia Havergal – eLearning Advisor Julia Taylor – eLearning Advisor www.rsc-south-west.ac.uk RSCs – Stimulating and supporting innovation in learning Acceptable Use Summary

benjamin
Download Presentation

The e-Safety Agenda – Policies & Practice AUP, Risk Assessment and Learner Involvement Monday 11 th January 2010 Vi

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The e-Safety Agenda – Policies & Practice AUP, Risk Assessment and Learner Involvement Monday 11th January 2010 Virginia Havergal – eLearning Advisor Julia Taylor – eLearning Advisor www.rsc-south-west.ac.uk RSCs – Stimulating and supporting innovation in learning

  2. Acceptable UseSummary • Be clear and concise • Be wide-ranging – think laterally! • Reflect your setting • Encourage end-user input • Use appropriate tone and style • Promote positive uses of technologies • Outline acceptable and unacceptable use • Clearly outline network monitoring activity • Clearly outline sanctions for unacceptable use • Regularly communicate to all stakeholders • Regularly review and update! AUPs in context: Establishing safe and responsible online behaviours - Becta

  3. Safeguarding and Risk Safeguarding is more than having safer recruitment policies and procedures in place. It means having a culture of vigilance where all staff know their responsibilities and act accordingly and all learners are aware of what they can expect and what to do if they have concerns. Safeguarding looks at all types of harm and the prevention of these types of harm, rather than just looking at abuse and neglect, as child protection does. Foreword to LSIS(DIUS commissioned) ‘Safer Recruitment and Safeguarding Learners in the FE Sector’ Workshop Handbook –2009

  4. Assessing Risk This is not about eliminating all risk from the lives of young people, as learning how to deal with and avoid risks is part of growing up and learning to cope with the world. This is about protecting them from significant harm and avoidable danger. LSIS (DIUS commissioned) ‘Safer Recruitment and Safeguarding Learners in the FE Sector’ Workshop Handbook –2009 March 7, 2014| slide 4

  5. e-Safety Audits March 7, 2014| slide 5

  6. Policies and Practice March 7, 2014| slide 6

  7. Assessing Risk Safeguarding Children Online: how e-safe is your school and your learners? March 7, 2014| slide 7

  8. The C’s of e-Safety Content Commerce Contact Conduct Culture March 7, 2014| slide 8

  9. Assessing Risk

  10. Assessing Risk • Commerce • When using new technologies, there is a risk that a • young person could do something that has financial • or commercial consequences. • Culture • Young people need frequent education and guidance • to embed and reinforce e-safety messages. • There is a risk that young people may get involved in • inappropriate or antisocial behaviour while using new • technologies. • Signposts to Safety • Teaching e-Safety at Key Stages 3 and 4, Becta March 7, 2014| slide 10

  11. Assessing RiskLocal Authority Approach Online Safety for Schools – a methodology for assessing risk (Draft documentation) www.clusterweb.org.uk/docs/eSafetyWhitePaper.doc March 7, 2014| slide 11

  12. Risk Assessment MatrixExample March 7, 2014| slide 12

  13. Risk Assessment MatrixExample March 7, 2014| slide 13

  14. Involving our Learners Develop Learner Involvement Strategies Developing resources to support e-Safety Enabling learners to develop resources to support e-Safety Including e-Safety within the learner curriculum e-Safety Projects CyberMentors – tackling cyber bullying e-Buddies, e-Ambassadors, PlymKids March 7, 2014| slide 14

  15. Learner Involvement “Technology is like giving children wings, but you can’t always control the directions in which they fly.” SWGfL PlymKids Project, 2009 March 7, 2014| slide 15

  16. Examining e-Safety OnlineSessions start at 11am Policies and Practices – January 11th JANET - AUPs- Assessing Risk – Learner Involvement Infrastructure and Technology – February 4th Controlling Access - Filtering - Security Education and Training – February 12th and February 25th February 12th - Vulnerable Learners and Resources February 25th - Staff Development and Resources Standards and Inspection - March 4th Good Practice – OFSTED and Becta e-Safety Tips and tricks – March 18th College practitioners share their activities and resources March 7, 2014| slide 16

  17. For further information JISC RSC Exeter Office Room HRS/10, Greystone House, Exeter College 01392 205472 JISC Regional Support Centre South West rscadvice@rsc-south-west.ac.uk juliataylor@rsc-south-west.ac.uk Website http://www.rsc-south-west.ac.uk

More Related