esafety n.
Skip this Video
Download Presentation

Loading in 2 Seconds...

play fullscreen
1 / 50

eSAFETY - PowerPoint PPT Presentation

  • Uploaded on

eSAFETY. Jenni Spencer Children’s safeguarding quality assurance unit CSF. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life. ‘DIGITAL NATIVES’. INTERNET ACCESS.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'eSAFETY' - dallon

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Jenni Spencer

Children’s safeguarding quality assurance unit


digital natives
Children are ‘digital natives’

Exposed to ICT at an ever younger age.

ICT is embedded in reception classrooms and is a constant feature of school life

internet access
  • Internet access and technology is becoming cheaper and CYP have increased access to internet
  • CYP spending increasing amounts of time online and sharing an ever widening range of images and personal information
  • Children are moving away from traditional media
the internet is good

The internet provides children with;

  • Excellent opportunities for learning
  • Access to a wealth of information
  • The opportunity to socialise and communicate with friends and improve their confidence
  • The ability to develop hobbies and interests
  • The chance to play games, listen to music, watch videos and have fun!




  • Search engines
  • Homework
  • Projects
  • Personal interest
  • Amazing facts

The biggest library in the world

  • Email/chat
  • VoIP - Skype
  • Instant Messenger
  • Multi-user games
  • Social networks

Brings people together

  • Blogs (web log)
  • Vlogs (video log)
  • Websites
  • Text & pictures
  • Music/photo/video

Anyone can become a publisher

cyp use of internet
CYP increasingly communicate via;

Mobile phone text messaging


Games consoles offering internet and WiFi connections

CYP use of internet
IM chat rooms( MSN)

Web logs

Image and video sharing sites (Flickr, You Tube)

Social networking sites (Bebo, MySpace, Facebook)

different usage
Different usage


Mostly email & web for research


Interactive chat, IM, Music, Games, Blog

adults often have anxieties about new media
Adults often have anxieties about new media…

Everything that’s already in the world when you’re born is just normal;


“Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it …until it’s been around for about ten years when it gradually turns out to be alright really.”

Douglas Adams

emerging issues
Emerging issues
  • Wifi- internet can be accessed wirelessly
  • Technologies are converging- gaming consoles (PSP, Nintendo, X box, DS) and mobile phones have broadband access.
  • Gaming sites, instant messaging sites (IM) and photo sharing technologies are merging and becoming components of larger social networking sites (SNS) which also contain personal profiles
  • Exposure to inappropriate content e.g. content that is pornographic, hateful, violent, encourages activities that are dangerous or illegal or just age inappropriate
  • Extreme material Unsolicited receipt by CYP of emails containing links to pornography/child abuse images
  • Inaccurate content- YP unable to discern
  • Created Content- YP publish personal info
  • Blur between content & advertising
  • Junk or scam emails from unscrupuloustraders
  • Invasive programmes - adware/popups
  • CYP give out financial details including credit card details of parents
  • Children registering with gambling websites
bbc news boy three buys car on internet
BBC NEWS - Boy, Three, Buys Car on Internet

Jack here bought a pink Nissan on an internet auction site

“A three-year-old boy has used his mother's computer to buy a £9,000 car on an internet auction site”

Jack’s parents only discovered their son's successful bid when they received a message from eBay about the Barbie pink Nissan Figaro.

Rachael Neal, 36, said her son:

“was quite good at using the computer”

  • Predatory adults (often posing as children) use discussion forums, chat rooms and social networking sites to make contact with and groom children to sexually exploit them
  • CYP encouraged to perform sexual acts via webcam or to witness an adult exposing themselves
  • Cyber bullying via mobile phone text, chat rooms, social networking sites
  • Young people may become involved in inappropriate or antisocial behaviour while using new technologies
  • CYP not just recipients of downloaded content but are active participants uploading content to a worldwide audience
  • Web 2.0 environments – young people publish detailed accounts of their personal lives, contact info, photos and videos oblivious to possible implications and the permanence of their profiles
changing environments
Changing environments

WEB v 1.0

WEB v 2.0


+ Uploading


+ Creating

+ Personal


+ Converged media

Separate media

+ Truly interactive


ceop strategic overview 2008 9
CEOP Strategic Overview 2008/9
  • Child exploitation and online protection centre (CEOP)-part of UK police,
  • Majority of children’s reports concern online grooming (89%)
  • Contact abuse (3%)
  • Image distribution (2%)
  • Increasing numbers children report being asked to perform sexual acts on line via webcam
  • Increase in number of abusive images online particularly abuse images of babies and very young children
  • Increase in violent and sadistic images
  • Increasing level of threatening behaviour used as part of grooming techniques
bbc news man jailed after grooming girls
BBC News - Man Jailed After Grooming Girls

Police found Etheridge, a carpenter, had more than 200 indecent images of girls, aged 13 to 15, on his mobile phone and thousands more on his computer.

The court was told Etheridge offered mobile phone top-up vouchers to girls in return for them sending indecent images of themselves in messages.

Most worrying of all, he escalated from downloading internet images, to grooming girls to make their ownphotos and actually meeting a girl to carry out sexual acts.

emerging risks
Emerging risks
  • Wifi-taking advantage of another persons (unsecured) wireless broadband connection to commit grooming and image offences
  • Integration of GPS technology into most new mobile phone models enables offenders to locate and track movements of CYP
  • Hacking plus Blackmail is emerging as a notable feature of grooming- offender hacks into YP’s social network homepage and sexualises existing photos and uses to blackmail YP to coerce them into interacting on webcam or meeting offline
  • Use of P2P platforms to send, share and order indecent images
  • Cyberbullying- YP create an online profile using details of a pupil or acquaintance and expose them to risk by inviting contact from unknown persons or even suspect online contacts (‘Pass the Pervert’)
Promote the positive/respond to the negative
  • Don’t be risk averse
  • Knowledge v Wisdom
  • Resilience to risks and knowledge of how to deal with them
how to stay safe online top tips for children
How to stay safe online Top tips for children
  • If anything online makes you feel scared or uncomfortable tell your carer
  • Only talk to people you know online
  • Make sure you keep your personal details private
  • Set your privacy levels to ‘Friends Only’
  • Do not send nasty messages or bully other people online


If you get a nasty message or get sent anything that makes you feel uncomfortable, do not reply. Show it to your carer
  • Do not meet up with friends you have met online
  • Do not let others know your online password
  • Think carefully about what you say or publish online
Never open an attachment unless it is from someone you know
  • Reject Bluetooth messages/pairing requests from unknown users/leave Bluetooth in undiscoverable mode
  • Use the Report Abuse button to report things that concern you
Part of Staying Safe outcome of ECM
  • CSCB has an e safety sub group
  • e safety policy- part of school safeguarding pack
  • e safety contact officer- needs to be one in every school
  • e safety incident report form- to report all incidents concerning e safety to CSCB
e safety contact officer role and responsibility
E Safety Contact Officer- role and responsibility
  • e safetyawareness is raised and maintained within their school through dissemination/display of publicity material for children, parents and staff
  • All staff in school are aware of the e safety policy and procedure and that it is implemented and reviewed and updated on a regular basis
  • All staff know how to access e safety training and that sufficient numbers of staff attend
  • An e safety education is provided/signposted for children
  • e safety is promoted to parents and carers
Pupils are clear about who they should report e safety concerns to within the setting
  • e safety incidents are responded to in an appropriate manner with appropriate action taken according to procedure
  • e safety issues are monitored and reported to management and other agencies where appropriate
  • a log of all e safety incidents is kept
  • support, information and advice is provided to staff and children within the setting
e safety incident report form description of incident
E-SAFETY INCIDENT REPORT FORM Description of incident
  • □ bullying or harassment (cyber bullying
  • □ deliberately bypassing security or access
  • □ hacking or virus propagation
  • □ racist, sexist, homophobic religious hate material
  • □ terrorist material
  • □ drug/bomb making material
  • □ child abuse images
  • □ on-line gambling
  • □ soft core pornographic material
  • □ illegal hard core pornographic material
  • □ other (please specify)
nature of incident
Nature of incident
  • Deliberate access/Accidental access

Did the incident involve material being;

□ created □ viewed □ printed □ shown to others

□ transmitted to others □ distributed

Could the incident be considered as;

□ harassment □ grooming □ cyber bullying □ breach of AUP

action taken
Action taken
  • Child/young person/ Staff
  • □ incident reported to head teacher/senior manager
  • □ advice sought from Safeguarding and Social Care
  • □ referral made to Safeguarding and Social Care
  • □ incident reported to police
  • □ incident reported to social networking site
  • □ incident reported to IT
  • □ child’s parents informed
  • □ disciplinary action to be taken
  • □ child/young person debriefed
  • □ e-safety policy to be reviewed/amended