child protection, safeguarding & e-safety policy · child protection and safeguarding policy...

48
Child Protection and Safeguarding Policy June 2016 Page 1 of 48 Child Protection, Safeguarding & E-Safety Policy (Including practice guidance) 2016 This policy should be taken as part of the overall strategy of the school and implemented within the context of our vision, aims and values as Church of England Schools. “Building on our Christian Foundation, and in partnership with our school and wider communities, we live, love and learn together in God's ever-changing world” Designated Safeguarding Lead in each school is: Cutcombe: Marcus Capel Designated Deputy Lead: Paula Gay (01643) 841462 Timberscombe: Marcus Capel Designated Deputy Lead: Tamsin Blackmore (01643) 841259 Safeguarding Governor: Paula Gay “Safeguarding children is everybody’s business” (Lord Laming) Policy Review Date: 29.6.16 The Beacon Federation of Cutcombe and Timberscombe Church of England First Schools “Live, Love and Learn Together”

Upload: others

Post on 30-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 1 of 48

Child Protection, Safeguarding & E-Safety Policy

(Including practice guidance)

2016

This policy should be taken as part of the overall strategy of the school and implemented

within the context of our vision, aims and values as Church of England Schools. “Building on our Christian Foundation, and in partnership with our school and wider

communities, we live, love and learn together in God's ever-changing world” Designated Safeguarding Lead in each school is: Cutcombe: Marcus Capel Designated Deputy Lead: Paula Gay (01643) 841462 Timberscombe: Marcus Capel Designated Deputy Lead: Tamsin Blackmore (01643) 841259

Safeguarding Governor: Paula Gay

“Safeguarding children is everybody’s business” (Lord Laming)

Policy Review Date: 29.6.16

The Beacon Federation of Cutcombe and Timberscombe Church of England First Schools

“Live, Love and Learn Together”

Page 2: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 2 of 48

Contents Page

1 Forward 3

2 Introduction 4

3 The Policy and Guidance 4

4 Reporting concerns (procedures) 5

5 Framework 5

6 The role of Schools and their Leadership Team 6

7 Child Abuse 8

7.1 Introduction 8

7.2 Physical abuse 8

7.3 Emotional abuse 8

7.4 Sexual abuse 8

7.5 Neglect 9

7.6 Domestic abuse 10

7.7 Child Sexual Exploitation (CSE) 10

7.8 Radicalisation 11

7.9 Female Genital Mutilation (FGM) 11

7.10 Forced Marriage 11

7.11 On-line 12

8 Confidentiality 12

9 Records and Monitoring 13

10 Attendance at Child Protection conferences 13

11 Safe Children, Safe Staff 13

12 Useful Information 15

Appendix A: School safeguarding leads 16

Appendix B: Child Protection procedure checklist for school 16 staff

Appendix C: Prompt sheet for Child Protection referrals 17

Appendix D: Procedures if an allegation is made against a 18

member of school staff

Appendix E: Process map for school staff reporting a concern 19

of a vulnerable individual

Appendix F: What to do if you are worried a child is being 21

abused

Appendix G: LSCB Escalation Policy 22 Appendix H: ECF E-Safety Policy 2015 25

Page 3: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 3 of 48

1 Forward

Our Schools recognise that the safety and welfare of children is paramount and that we have a responsibility to protect children in all our schools’ activities. We take all reasonable steps to ensure, through appropriate procedures and training, that all children, irrespective of sex, age, disability, race, religion or belief, sexual identity or social status, are protected from abuse.

We will seek to:

Create a safe and welcoming environment where children can develop their skills and confidence.

Support and encourage other groups and organisations to implement similar policies.

Recognise that safeguarding children is the responsibility of everyone, not just those who work with children.

Ensure that any training or events are managed to the highest possible safety standards

Review ways of working to incorporate best practice. Including this policy being regularly reviewed and updated to reflect current best practice and Government expectations.

Treat all children with respect regardless of age, disability, gender, racial heritage, religious belief, sexual orientation or identity.

Carefully recruit and select all employees, contractors and volunteers.

Respond swiftly and appropriately to all complaints and concerns about poor practice or suspected or actual child abuse.

Share information about concerns with agencies who need to know, and

involving parents and children appropriately

This Safeguarding Policy relates to all school employees or staff working within our schools and is in addition to the Working Together & Keeping Children Safe in Education 2016 guides. This policy document is produced in order to inform and assist our staff and contractual partners in meeting their responsibilities in terms of child protection, whether working directly or indirectly for our school.

Page 4: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 4 of 48

2 Introduction 2.1 Our schools accept safeguarding children and young people is a key element

within our work. All staff are all familiar with the requirements of “Working Together to Safeguard Children: A Guide to Interagency Working to Safeguard and Promote the Welfare of Children” (statutory guidance revised 2015) & Keeping Children Safe in Education (revised 5th September 2016) as all staff undertake regular safeguarding.

2.2 The Director of Children’s Services, within the Local Authority has the

overarching responsibility for safeguarding and promoting the welfare of all children and young people in the area. They have a number of statutory functions under the Children Acts 1989 and 2004 which make this clear. This policy is to add detail to schools expectations of staff to expect specific duties to happen in relation to children in need and children suffering, or likely to suffer, significant harm, regardless of where they are or who takes any further action.

2.3 The Director of Children’s Services and Lead Member for Children’s Services

in local authorities are the key points of professional and political accountability, with responsibility for the effective delivery of these functions. (Working together to Safeguard Children 2015)

“Children are best protected when professionals are clear about what is required of them individually, and how they need to work together.” (Working together to Safeguard Children 2015)

2.4 This school fully recognises its responsibilities for child protection. Though

the risk of child abuse cannot be eliminated, all schools staff strive to reduce the risk as far as is reasonably possible. This policy is designed to help achieve these aims and keep our children safe, happy and free from harm while discharging statutory duties in promoting the welfare of children and young people.

3 The Policy & Guidance 3.1 Schools recognise there are three main elements to Child Protection.

Prevention - through support and guidance offered by schools staff involved directly with children and young people.

Protection - by following agreed procedures, ensuring staff are appropriately recruited, trained and supported to respond sensitively and swiftly to Child Protection concerns.

Support - to children and young people who may have been abused or neglected, directly or through those who work directly with, or care for them.

Page 5: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 5 of 48

4 Reporting Concerns (procedures) 4.1 Where it is believed that a child or young person is suffering from, or is at risk

of, significant harm, schools staff follow the procedures set out in the South West Child Protection Procedures (www.swcpp.org.uk) and the Somerset Safeguarding Children Board (SSCB) documents which can be found at http://www.proceduresonline.com/swcpp/somerset/index.html

4.2 These procedures clearly confirm that the welfare of the child is of paramount

importance and takes precedence over sensitivities about relations with partners, parents, or the likely reaction of others in the community, and any wish a child might have for complete confidentiality (which cannot be guaranteed).

4.3 Members of staff not following procedures could put themselves at risk of

disciplinary action and the child concerned at risk. As long as the procedures are adhered to, members of staff will receive the full support of school and the Local Authority.

4.4 Section 6 of this document explains the types of abuse schools staff may

come in contact with; though the list is not exhaustive. However, all schools staff will be aware of this through their safeguarding training.

4.5 If, via the schools employee’s professional judgement or discussion with their

manager or Designated Safeguarding Lead (DSL), they believe a child or young person is suffering or likely to suffer, then a referral should be made to Somerset Direct on 0300 123 2224.

4.6 In many cases the concerns do not reach the threshold for a Child Protection

Referral but that of a Child in Need of an earlier intervention. 4.7 This is the function of the Early Help Assessment (Common Assessment

Framework – CAF) and Team Around the Child meeting. This will identify a lead professional who will bring appropriate professionals together to empower the family to address concerns raised. Details of this process are available at: http://www.somerset.gov.uk/policies-and-plans/strategies/common-assessment-framework-caf/

4.8 There is a document Child Protection Procedure Checklist for Schools Staff

set as Appendix B that will help make your assessment. 5 Framework 5.1 Schools recognise they do not operate in isolation. The welfare of children

and young people is not just the responsibility of the Local Authority but a partnership with other public agencies, the voluntary sector and service users and carers.

Page 6: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 6 of 48

5.2 Child Protection is the responsibility of all adults, especially those working with children and young people. The development of appropriate procedures and the monitoring of good practice are the responsibilities of the SSCB.

6 The role of School and the Leadership Team 6.1 Schools and their Leadership Teams recognise their responsibilities with

regard to Child Protection and to safeguarding and promoting the welfare of children and young people.

6.2 Schools have a Designated Safeguarding Lead (DSL) who is the lead officer

for their individual school or federation of schools. In addition to this every school will have a named deputy safeguarding lead. Staff should take all daily case concerns to their line manager as first point of contact.

6.3 Schools Leadership Teams will:

Recognise how to identify signs of abuse and know which outside child protection agency to contact in the event of a child protection matter coming to their attention.

Ensure all schools staff have basic awareness training in Safeguarding and Child Protection or Introduction to Child Protection Training. For those who are trained at “Working Together”, (previously called level 2), this will need to be refreshed every two years, by attending Update Training (previously called Level 3).

Act as a source of advice to ensure schools staff are up to date with relevant policies and practices or changes in legislation.

Determine the level of training staff should receive in each school appropriate to their level of work. Schools Leadership Teams will ensure staff have appropriate and refresher training as required. Each school’s leadership team will manage for their school. The DSL will monitor this process to ensure schools are monitoring training. (Such monitoring ensures schools comply with section 11 of The Children Act (2004) which places duties on a range of organisations and individuals to ensure that their functions – and any services that they contract out to others – are discharged having regard to the need to safeguard and promote the welfare of children).

Ensure that appropriate information is available at the time of referral and that the referral is confirmed in writing under confidential cover.

Liaise with Somerset Direct, Local Children’s Social Care and other agencies, as appropriate.

Act as a source of advice and expertise and keep school colleagues informed about any action taken and any further action required.

Ensure that a proper record is kept of any referral and action taken, and that this is kept safely and in confidence.

Manage and deliver staff child protection training and review the operation of the Child Protection Policy annually to ensure the procedures are working and that it complies with current best practice. The DSL will report to the School’s Leadership Team quarterly on any issues with regard to the implementation of this policy.

Page 7: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 7 of 48

6.4 The Schools’ designated safeguarding lead is Marcus Capel Details can be

found in Appendix A. 6.5 This policy applies to all staff working in schools. Key elements to this policy:

Establishing positive, supportive, secure working practices that put children first.

Ensuring we practise safer recruitment in checking the suitability of all staff who work in schools. .

Keeping child protection issues at the forefront of our work and know who in the school is the DSL.

Ensuring that schools implement procedures for identifying and reporting cases, or suspected cases of abuse and regularly reviews them.

Supporting children and young people in accordance with his/her agreed child protection plan.

We will follow the procedures set out by the SSCB and take account of all guidance issued by the DfE, OfSTED and other significant bodies.

Ensure we have a DSL and a Deputy who have received appropriate training and support for their role (training in child protection and inter-agency working must be carried out every two years for schools staff at the appropriate level). In addition to this we will ensure every school has a DSL and deputy and staff are reminded termly who these people are.

Develop effective links with relevant agencies and co-operate as required with their enquiries regarding child protection matters including attendance at case conferences, if appropriate.

Keep written, dated and signed records of concerns about children, even where there is no need to refer the matter immediately. This includes the use of any screening tool that aids identification of Child Sexual Exploitation (CSE), radicalisation, Female Genital Mutilation (FGM), on-line use or other such issues and that such record is securely placed. See section 6.7.7.

Follow procedures where an allegation is made against a member of schools staff and that such procedures are robust to deal with any allegation and that clear records of investigations and outcomes of allegations are held on staff files. This will include contacting Somerset Direct and possibly discussion with the Local Authority Designated Officer (LADO). Notify appropriate bodies or their designated authority within one month when the services of a person are discontinued because he/she were considered unsuitable to work with children.

Risk-assess any off-site activity, led by schools.

Schools staff will escalate any safeguarding concerns via the appropriate process and address any of its own deficiencies or weaknesses to ensure the child’s safety is paramount.

6.6 Schools staff and their Leadership Team will therefore:

Page 8: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 8 of 48

Promote an ethos where children and young people feel secure and are encouraged to use their preferred means of communication, and are understood by adults using inclusive communication skills and strategies. (See European Convention on Human Rights and Health and Social Care Act 2012).

Promote approaches to ensure that children and young people know which adults they can approach if they are worried or are in difficulty.

Promote approaches and activities, when appropriate, which equip children and young people with the skills they need to stay safe from abuse and which will help them develop realistic attitudes to the responsibilities of adult life.

Ensure that, wherever possible, every effort will be made to establish effective working relationships with parents and colleagues from other agencies.

7 Child Abuse 7.1 Introduction 7.1.1 All schools staff are alert to the possible signs of abuse of a child or young

person due to their regular safeguarding training. Forms of abuse are: 7.2 Physical abuse 7.2.1 Physical abuse may involve hitting, shaking, throwing, poisoning, burning or

scalding, drowning, suffocating, or otherwise causing physical harm to a child. Physical harm may also be caused when a parent or carer fabricates the symptoms of, or deliberately induces, illness in a child.

7.2.2 Where your concern is about physical abuse, make sure you note where on

the body the injury is and describe shape and size. Be careful to record the factual evidence – i.e. what you can actually see, not your opinion of how the injury may have been sustained.

7.3 Emotional abuse

7.3.1 Emotional abuse is the persistent emotional maltreatment of a child such as to cause severe and persistent adverse effects on the child’s emotional development.

7.3.2 It may involve conveying to children that they are worthless or unloved,

inadequate, or valued only insofar as they meet the needs of another person. It may include not giving the child opportunities to express their views, deliberately silencing them or ‘making fun’ of what they say or how they communicate. It may feature age or developmentally inappropriate expectations being imposed on children. These may include interactions that are beyond the child’s developmental capability, as well as overprotection and limitation of exploration and learning, or preventing the child participating in normal social interaction. It may involve seeing or hearing the ill-treatment of another. It may involve serious bullying (including cyber bullying), causing children frequently to feel frightened or in danger, or the exploitation or

Page 9: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 9 of 48

corruption of children. Some level of emotional abuse is involved in all types of maltreatment of a child, though it may occur alone.

7.3.3 Emotional abuse is hard to evidence so detail a number of events that have

led to your concerns.

7.4 Sexual abuse

7.4.1 Sexual abuse involves forcing or enticing a child or young person to take part in sexual activities, not necessarily involving a high level of violence, whether or not the child is aware of what is happening. The activities may involve physical contact, including assault by penetration (for example, rape or oral sex) or non-penetrative acts such as masturbation, kissing, rubbing and touching outside of clothing. They may also include non-contact activities, such as involving children in looking at, or in the production of, sexual images, watching sexual activities, encouraging children to behave in sexually inappropriate ways, or grooming a child in preparation for abuse (including via the internet). Sexual abuse is not solely perpetrated by adult males. Women can also commit acts of sexual abuse, as can other children.

7.4.2 If the child or young person discloses to you any such incident record in as

much detail as possible what was said, who was there and the child or young person’s emotional state throughout the disclosure. Make sure your notes are contemporaneous, dated and kept securely.

7.5 Neglect

7.5.1 Neglect is the persistent failure to meet a child’s basic physical and/or psychological needs, likely to result in the serious impairment of the child’s health or development. Neglect may occur during pregnancy as a result of maternal substance abuse. Once a child is born, neglect may involve a parent or carer failing to:

provide adequate food, clothing and shelter (including exclusion from home or abandonment);

protect a child from physical and emotional harm or danger;

ensure adequate supervision (including the use of inadequate care-givers); or

ensure access to appropriate medical care or treatment. 7.5.2 It may also include neglect of, or unresponsiveness to a child’s basic

emotional needs. 7.5.3 If you are to refer a child or young person because of possible neglect, always

check back to see if there have been any previous concerns. The Children Act 1989 talks about how the persistent neglect of very basic needs is likely to cause an impairment in the child or young person’s development.

Page 10: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 10 of 48

7.6 Domestic abuse 7.6.1 Domestic abuse may take many forms. Witnessing the physical and

emotional suffering of a parent may cause considerable distress to children and both the physical assaults and psychological abuse suffered by adult victims who experience domestic abuse can have a negative impact on their ability to look after their children. Children can still suffer the effects of domestic abuse, even if they do not witness the incidents directly. However in up to 90% of incidents involving domestic violence where children reside in the home, the children are in the same or the next room. Children's exposure to parental conflict, even where violence is not present, can lead to serious anxiety and distress among children. Children can see school as a safe retreat from problems at home or alternatively not attend school through a perceived need to be at home to protect abused parents or siblings.

7.6.2 Domestic abuse can therefore have a damaging effect on a child's health,

educational attainment and emotional well-being and development. The potential scale of the impact on children is not always easy to assess but may manifest itself as behavioural, emotional or social difficulties, including poor self-esteem, withdrawal, absenteeism, adult-child conflict. Children sometimes disclose what is happening or may be reluctant to do so hoping that someone will realise something is wrong.

7.6.3 Always think through whether the case in question fits more appropriately

within a ‘Child in Need’ framework than within a Child Protection framework. (For example, mucky children may simply come from mucky families; clearly the family needs to do something about the child’s cleanliness and appearance, and may need some support in this, but it might not be the case that the child or young person is being abused and in need of protection.)

7.7 Child Sexual Exploitation (CSE) 7.7.1 There will be other circumstances which give cause for serious concern about

the welfare of pupils; such as Child Sexual Exploitation (CSE). 7.7.2 The sexual exploitation of children and young people under 18 involves

exploitative situations, contexts and relationships where young people (or a third person or persons) receive something (e.g. food, accommodation, drugs, alcohol, cigarettes, affections, gifts, money) as a result of them performing, and/or another or others performing on them, sexual activities.

7.7.3 Child sexual exploitation can occur through the use of technology without the

child's immediate recognition; for example being persuaded to post sexual images on the internet/mobile phones without immediate payment or gain.

7.7.4 In all cases those exploiting the child/young person have power over them by

virtue of their age, gender, intellect, physical strength and/or economic or other resources.

Page 11: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 11 of 48

7.7.5 Violence, coercion and intimidations are common, involvement in exploitative relationships being characterised in the main by the child's or young person’s limited availability of choice resulting from their social/economic and/or emotional vulnerability.

7.7.6 While professional judgement may lead you to refer this matter to Somerset Direct a screening tool has been developed that may help an SSE employee in their judgement.

7.7.7 There are fuller details around this subject including access to the screening tool at https://slp.somerset.org.uk/sites/somersetlscb/

7.8 Radicalisation

7.8.1 The UK Government since the 2011 Prevent review defines extremism as: ‘vocal or active opposition to fundamental British values, including democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs. We also include in our definition of extremism calls for the death of members of our armed forces.

7.8.2 Radicalisation is defined by the UK Government within this context as “the process by which a person comes to support terrorism and extremist ideologies associated with terrorist groups.”

7.8.3 If you become concerned that this may raise a professional concern about a young person you work with or know then Appendix E will help you raise this with appropriate persons.

7.9 Female Genital Mutilation (FGM) 7.9.1 FGM comprises all procedures that involve partial or total removal of the

external female genitalia, or other injury to the female genital organs for non-medical reasons (World Health Organisation). It is also sometimes referred to as female genital cutting or female circumcision. The practice is illegal in the UK.

7.10 Forced Marriage 7.10.1The UK Government describe this as taking someone, usually overseas, to

force them to marry (whether or not the forced marriage takes place) or marrying someone who lacks the mental capacity to consent to the marriage (whether they're pressured to or not). Breaching a Forced Marriage Protection Order is also a criminal offence.

Page 12: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 12 of 48

7.11 On-line 7.11.1 Mobile phones, laptops, iPads, and other on-line type products are integrated

into all our lives. However, there are those that seek to use these for their own or others gratification. The link below provides more information on on-line safety and cover issues such as:

Bullying, including online bullying and prejudice-based bullying, racialization and/or extremist behaviour

Child sexual exploitation and trafficking

The impact of new technologies on sexual behaviour, for example sexting.

http://swgfl.org.uk/news/News/E-Safety/Making-Sense-of-the-New-Online-Safety-Standards

7.11.2 Schools, via e-Learning and Information Management (eLIM) and the LSCB

and the South West Grid for Learning, will consider any improper use as a possible safeguarding concern, which should be considered as child protection issues and discussed with your line manager or DSL as appropriate.

Appendix F is a flow chart to help staff in considering whether to make a Child Protection referral.

8 Confidentiality 8.1 Confidentiality needs to be discussed and fully understood by all those

working with children, particularly in the context of child protection. No adult must ever guarantee confidentiality to any child or young person. Staff should make children and young people aware that if they disclose information that may be harmful to themselves or others, then certain actions will need to be taken.

8.2 Personal information will only be disclosed to third parties (including other

agencies) with the consent of the subject of that information (Data Protection Act 1998, European Convention on Human Rights, Article 8). Wherever possible, consent should be obtained before sharing personal information with third parties. In some circumstances, obtaining consent may not be possible or in the best interest of the child or young person, e.g., where safety and welfare of that child or young person necessitates that the information should be shared. The law permits the disclosure of confidential information necessary to safeguard a child or children. Disclosure should be justifiable in each case, according to the particular facts of the case, and legal advice should be sought if in doubt.

Page 13: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 13 of 48

9 Records and Monitoring 9.1 Well-kept records are essential to good child protection practice. Schools are

clear about the need to record any concerns held about children or young people, the status of such records and when these records should be passed over to other agencies.

9.2 In our work with children, young people and families, and others in an

advisory and support role, we will promote all institutions to:

Keep clear detailed written records of concerns about children and young people.

Ensure all records are kept secure and in a locked location.

Ensure records are passed on to the receiving institution if a child or young

person transfers. 9.3 Schools written notes/records of any child protection issues regarding

individual children and young people will be kept securely and separately electronically. Where necessary we ensure that child protection information has been passed on to Somerset Direct appropriately.

10 Attendance at Child Protection Conferences 10.1 If a child or young person becomes the subject in a Child Protection

Conference you may be asked to share information about the child or young person and his/her family. Usually this will be in the form of a written report, the contents of which will be shared with parents/carers prior to the meeting.

10.2 Occasionally, there may be information which is confidential and which will be

shared in a closed meeting prior to the conference. If this is necessary, the chair of the conference will discuss the matter with parents/carers beforehand.

10.3 When any child or young person becomes the subject of a conference, local

procedures require all other children in the family are considered. It may well be that staff will be required to provide information on children with whom there appear to be no direct concerns.

10.4 Staff may contribute to the process of risk assessment and the decision about

the child being in receipt of a child protection plan. 11 Safe Children - Safe Staff 11.1 When recruiting staff schools leadership teams will ensure all appropriate

checks are made. It is important to remember that:

Page 14: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 14 of 48

All staff are an adult role model for children: courteous, friendly and kind. No member of staff should make suggestive or discriminatory or other inappropriate comments.

All staff should respect children at all times regardless of their sex, ethnicity,

disability or sexual orientation.

All staff should use social network appropriately, this includes only using official work accounts to promote work and never referring to individual children. Further information can be found on the eLIM website. https://slp.somerset.org.uk/sites/edtech/SitePages/e-Safety/Social%20Networks.aspx

Staff must never allow or engage in inappropriate verbal or physical contact of

any description.

Staff should not allow children or adults to engage in abusive activities, ridiculing, bullying etc electronically or face to face.

Managers must develop an ethos that allows staff to feel comfortable and

caring enough to point out any inappropriate attitudes or behaviour to each other.

All staff should ensure that when working individually with a child or young

person, they should be mindful of safe working practices, (e.g. where possible doors are left open), other staff are aware they are working on a one to one basis, and immediate help is available if needed.

All staff should report disclosures or concerns.

Staff should never trivialise a child abuse issue.

Staff should not drive a child or young person home without permission of the

parent/carer and line manager.

No member of staff should ever take a young person to their own home. In any one-to-one situation that is not a clear and proper part of your work, you put yourself at risk of false allegations.

Page 15: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 15 of 48

12 Useful Information

12. 1 This policy should be read in conjunction with other related policies such as:

1. Recruitment and Selection 2. Management of Allegations Against Staff 3. Behaviour Management 4. Anti-Bullying 5. Physical Interventions 6. Health and Safety 7. Safeguarding and ICT 8. Use of Photography and Videos 9. Drugs and Substance Misuse 10. Equal Opportunities 11. First Aid (including management of medical conditions) 12. Racial Equality

12.2 Useful Websites

www.somersetsafeguardingchildrenboard.org.uk 12.3 Useful Phone Numbers

1. Somerset Direct 0300 123 2224

2. The Education Safeguarding team at County Hall, Taunton

Tony Waller: Service Manager, Safeguarding and Education Welfare Service 1823 355941 Jane Weatherill: Education Safeguarding Advisor 01823 355014 [email protected]

Kate Kift: Early Years Education Safeguarding Advisor 07977401307 / [email protected] Kieran Canham: Project Support Assistant. Kieran has moved across from the Education Welfare Central Team to support safeguarding. He will be monitoring Safeguarding Notifications and Children with No Provision. He will also be attending the County’s MASH panel and MISPER panels and will be contacting Education providers directly should any issues arise regarding these panels

3. Local Authority Designated Officer (LADO)

Antony Goble 01823 357727

APPENDIX A: Schools’ Safeguarding Leads

Schools’ Designated Lead is Marcus Capel

Schools’ Deputy Designated Leads are: Tamsin Blackmore & Paula Gay

Page 16: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 16 of 48

APPENDIX B: Child Protection procedure checklist for Schools Staff. If:

A child or young person discloses abuse, or You suspect a child may have been abused, or You witness an abusive situation involving another professional.

You RECORD AND REPORT Respond without showing any signs of disquiet, anxiety or shock. Enquire casually about how an injury was sustained or why a child appears upset. Confidentiality must not be promised to children or adults in this situation. Observe carefully the demeanour of behaviour of the child or young person. Record in detail what has been seen and heard. Do not interrogate or enter into detailed investigations: rather, encourage the child or young person to say what he wants until enough information is gained to decide whether or not a referral is appropriate. Asking questions is fine to help understand what the issue is. Ensure the questions are open and give the child the ability to clarify. It is important NOT to ask leading questions. It is important to know when to stop asking questions and listen. It is important not to interrogate. Types of Questions you can ask:

Tell me (tell me what happened)

Explain (explain what you meant by)

Where did this happen/where were you

When did this happen

Remember you are only clarifying with the young person if something concerning did happen or could have happened from the information they give you.

Then REPORT to Somerset Direct (it may be helpful to discuss potential referrals with your line manager and/or the designated person without delay). Appendix F is a flow chart that will help staff in their deliberations as to whether to make a referral. Schools staff MUST NOT

Investigate suspected/alleged abuse themselves;

Evaluate the grounds for concern;

Seek or wait for proof;

Discuss the matter with anyone other than their line manager, Somerset Direct, designated person and, as appropriate e.g. the Headteacher.

Children’s Social Care & the Police are the only agencies that can investigate allegations of abuse. Escalation Process - Resolution of professional disagreements in work relating to the safety of children. Occasionally, there may be some professional disagreement as to whether child protection concerns meet thresholds etc. There is an escalation process document that is available on the LSCB web site, see Appendix G.

Page 17: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 17 of 48

APPENDIX C: Prompt sheet for Child Protection referrals Somerset Direct may ask you to complete the Common Request for Involvement form. This prompt sheet will help you bring together all necessary information before picking up the phone. Before making a referral through the locally agreed procedures, the following information should be available: Child’s details

Name, including any middle names and, if the child is known by more than one name; list all names known.

Date of birth. Address and telephone number. Health issues that may be relevant. Any known disabilities that may affect communication.

Family details Names of parents and/or carers. Names and ages of any other children in family. Ethnicity and cultural background and where appropriate information about

the need for interpreters. Any legal or custody documents known to exist. Name of the family’s GP.

School/provision history How long has the child attended this provision? Attendance record – check if there has been a problem with attendance, look

out for any patterns that emerge from attendance records, i.e. some children have been reported to miss every Monday because there have been problems at the weekend.

Behaviour – how does the child present? Check for any repeated patterns of behaviour, or sudden changes of behaviour. Do these relate to a change in circumstances at home?

Relationships with parents, school, other agencies: good, non-existent, volatile?

Child protection history Have you had previous concerns and have you made previous referrals? It is

important to revisit previous concerns to get a wider picture. Child protection services are reliant on other agencies to help them build up a clearer picture of what has been happening. The relationship between each event may be more significant than each individual event.

If you have referred in the past, what was the outcome? Never let the fact that no action was taken last time affect your way of managing new concerns. If you have a concern, always pass it on.

Informing the parent In most cases it is agreed that it is better to tell the parent that you intend to refer to Children’s Social Care or the Police but think it through. If you think telling may put the child or young person at more risk, take advice first. If in doubt, ring Somerset Direct (0845 3459122) and discuss with the Duty Social Worker. Making the referral Once there is all the necessary information available a child protection referral can be made with confidence, following the South West Child Protection Procedures (www.swcpp.org.uk). Record all your actions and responses from other agencies.

Page 18: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 18 of 48

APPENDIX D Procedures if an allegation is made against a member of Schools staff Never let allegations by a child or young person go unrecorded or unreported, including any made against you. In all instances the Designated Person or deputy must be informed. If the allegation concerns the Designated Person, then the Schools Leadership Team must be informed. In all situations the County HR contact and the Local Authority Designated Officer for Allegations Management, (LADO) must be informed. They can be contacted via Somerset Direct. If you receive a disclosure, about an adult colleague, it is important to reassure the child that what he says will be taken very seriously and everything possible done to help. If you are in the room when a child or young person begins to disclose concerns to another person, you should stay unobtrusively in the background. You may be able to support/witness what has been said if required. Remember: value your professional judgement.

Page 19: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 19 of 48

APPENDIX E: Process map for Schools staff reporting a concern of a vulnerable individual

Prevent and Channel

It is important for you as a member of staff to know where to go if you have a concern that someone may be on the route to radicalisation. Below is a flow

chart which aims to show the process as to which you can follow:

Member of staff identifies concern.

Concern reported to Schools Safeguarding Lead or Line Manager

Safeguarding with member of staff gather more information where possible and

identifies what further action is required

If there is no

immediate risk

If there an is immediate risk call 999

1. Speak with Somerset Direct

Or your other options are:

2. Call 101 and ask for Local Policing

Team

3. Contact your Regional Police Prevent & Channel Lead

(DI Mandy Pilling 07585307109 or DI Sam Norman 07881268432)

4. Email: [email protected]

.police.uk

5. Call the Anti-terrorist

Hotline on 0800 789 321

Page 20: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 20 of 48

Further information gathering with your institution and other key agencies that the individual is involved with. Are there shared concerns between partners?

Is there a vulnerability to radicalisation?

Police will organise a Multi-Agency Channel meeting which will be made of key partners. The meeting will be

chaired by your Local Authority.

Implement support plan depending on level of risk.

Regularly review process – Channel Panel members work together to review progress

and reduce risks.

The individual will exit the Channel process when all partner agencies feel that

the vulnerability to radicalisation has been completely removed or significantly lessened.

If it is deemed there is low risk –

further action within normal support. Key

agency progresses with further monitoring.

Yes

No

It is important to remember that consent is gained with the individual

to be part of Channel support and intervention.

Once a referral has exited the process, it will be reviewed at 6 and 12 months. If concerns remain, the individual can be

re-referred.

Page 21: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 21 of 48

APPENDIX F: What to do if you are worried a child is being abused

Useful Information and contacts: Somerset Direct: 0300 123 2224 [email protected] Local Safeguarding Children Board website ‘What to do if you are worried a child is being abused’ – government document ‘Key messages in Child Protection’ – Somerset LSCB

No further child protection action. May need to ensure necessary services are

provided by own agency or other agency. Record discussion. Consider

CAF / getset.

Discuss with Designated Safeguarding Lead

Concerns remain

Member of staff has concerns about a child’s welfare

In an emergency call 999 Discuss with line manager

No longer have concerns

Concerns remain

Referencing the LSCB threshold document:

Follow the Child Sexual Exploitation Screening Tool

process

Initiate a Early Help Ass Phone Somerset Direct with the concerns and follow up with an email

within 48 hours [email protected]

0300 123 2224

Page 22: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 22 of 48

APPENDIX G: LSCB escalation policy The below link is for the Local Safeguarding Children Board’s escalation policy that provides resolution of professional disagreements in work relating to the safety of children.

https://slp.somerset.org.uk/sites/somersetlscb/LSCB%20Documents/Escalation%20Policy.pdf

Page 23: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

23

Appendix H – E-Safety Policy and Acceptable Use Policy

Exmoor Coast Federation e-Safety Policy

This policy sets out the ways in which the school will:

educate all members of the school community on their rights and responsibilities with the use of technology;

build both an infrastructure and culture of e-safety;

work to empower the school community to use the Internet as an essential tool for life-long learning.

This policy is used in conjunction with other school policies and has been developed by a working group, which included representatives from all groups within the school. The e-safety policy will be reviewed annually and will be under continuous revision in response to significant new developments in the use of technologies, new threats to e-safety or incidents that have taken place.

Contents Scope of policy................................................................................................................................... 24 Schedule for Development, Monitoring and Review ......................................................................... 24 Roles and responsibilities................................................................................................................... 24

Education of pupils ............................................................................................................................ 26 Education and information for parents and carers ............................................................................. 27 Education of wider school community .............................................................................................. 27 Training of Staff and Governors ........................................................................................................ 27 Cyberbullying................................................................................................................................... 277

Technical Infrastructure ................................................................................................................... 288 Data Protection ................................................................................................................................. 299 Use of digital and video images ....................................................................................................... 299 Communication (including use of Social Media) .............................................................................. 30 Assessment of risk ............................................................................................................................. 31

Reporting and Response to incidents ................................................................................................. 32 Sanctions and Disciplinary proceedings ............................................................................................ 32 Sanctions: Pupils ................................................................................................................................ 33 Sanctions: Staff .................................................................................................................................. 34

Acceptable Use Policies 35

Page 24: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

24

Scope of policy This policy applies to all members of the school community, including staff, pupils, volunteers, parents/carers, visitors and community users. The Education and Inspections Act 2006 empowers Headteachers, to such extent as is reasonable, to regulate the behaviour of pupils when they are off the school site and empowers members of staff to impose disciplinary penalties for inappropriate behaviour. This is pertinent to incidents such as cyber-bullying, which may take place out of school, but are linked to membership of the school. The schools will manage e-safety as described within this policy and associated behaviour and anti-bullying policies, and will inform parents and carers of known incidents of inappropriate e-safety behaviour that take place in and out of school.

Schedule for Development, Monitoring and Review The Implementation of the e-safety policy will be monitored by an e-safety working group including the headteacher and e-safety governor, who will report to the governing body. The impact of the policy will be monitored by the e-safety working group by looking at:

the log of reported incidents

the Internet monitoring log

surveys or questionnaires of learners, staff, parents and carers

other documents and resources

future developments

Roles and responsibilities The Headteacher is responsible for ensuring the safety (including e-safety) of all members of the school community. The e-safety Leader will work with the Headteacher and the designated Safeguarding Lead [in these schools this is the same person], to have an overview of the serious child protection issues that arise from sharing of personal data, access to illegal or inappropriate materials, inappropriate online contact with adults, potential or actual incidents of grooming and cyber-bullying.

An e-safety working group will work as necessary with the e-safety Leader to implement and monitor the e-safety policy and AUPs (Acceptable User Policies).

Role Responsibility Governors Approve and review the effectiveness of the e-safety Policy

Delegate a governor to act as e-safety link

e-safety Governor and Headteacher works with the e-safety Leader to carry out regular monitoring and report to Governors

Head Teacher

Ensure that all staff receive suitable CPD to carry out their e-safety roles

Create a culture where staff and learners feel able to report incidents

Ensure that there is a progressive e-safety curriculum in place

Ensure that there is a system in place for monitoring e-safety

Follow correct procedure in the event of a serious e-safety allegation being made against a member of staff or pupil

Inform the local authority about any serious e-safety issues

Ensure that the school infrastructure/network is as safe and secure as possible

Ensure that policies and procedures approved within this policy are implemented

Use an audit to annually review e-safety with the school’s technical support (Simon Capp)

Page 25: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

25

e-safety Leader

Lead the e-safety working group

Together with the Headteacher, log, manage and inform others of e-safety incidents and how they have been resolved where this is appropriate

Lead the establishment and review of e-safety policies and documents

Lead and monitor a progressive e-safety curriculum for pupils

Ensure all staff are aware of the procedures outlined in policies relating to e-safety

Provide and/or broker training and advice for staff

Attend updates and liaise with the LA e-safety staff and technical staff

Meet with Senior Leadership Team and e-safety Governor to regularly discuss incidents and developments

Coordinate work with the school’s designated Child Protection Coordinator

Teaching and Support Staff

Participate in any training and awareness raising sessions

Read, understand and sign the Staff AUP

Act in accordance with the AUP and e-safety Policy

Report any suspected misuse or concerns to the e-safety Leader and check this has been recorded

Provide appropriate e-safety learning opportunities as part of a progressive e-safety curriculum and respond

Model the safe use of technology

Monitor ICT activity in lessons, extracurricular and extended school activities

Demonstrate consistently high standards of personal and professional conduct especially in relation to use of social networks, making sure that these are in line with school ethos and policies, including at the time of a Critical Incident

Pupils Read, understand and sign the Pupil AUP and the agreed class Internet rules

Participate in e-safety activities, follow the AUP and report concerns for themselves or others

Understand that the e-safety Policy covers actions out of school that are related to their membership of the school

Parents and Carers

Endorse (by signature) the Pupil AUP

Discuss e-safety issues with their child(ren) and monitor their home use of technology (including tablets, mobile phones and games devices) and the Internet

Access the school website in accordance with the relevant school AUP

Keep up to date with issues through newsletters, attendance at curriculum Information Meetings and other opportunities

Inform the Headteacher of any e-safety issues that relate to the school

Maintain responsible standards when using social media to discuss school issues

Technical Support

Ensure the school’s ICT infrastructure is as secure as possible and is protected from misuse or malicious attack

8

Page 26: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

26

Provider

Ensure users may only access the school network through an enforced password protection policy

Maintain and inform the Senior Leadership Team of issues relating to filtering

Keep up to date with e-safety technical information and update others as relevant

Ensure use of the network is regularly monitored in order that any misuse can be reported to the e-safety Leader for investigation

Ensure monitoring systems are implemented and updated

Ensure all security updates are applied (including anti-virus and Windows)

Sign an extension to the Staff AUP detailing their extra responsibilities

Community Users

Sign and follow the Guest/Staff AUP before being provided with access to school systems

Education of pupils Pupils to ‘understand what constitutes unsafe situations and are highly aware of how to keep themselves and others safe in different situations including in relation to e-safety’

School Inspection Handbook - Ofsted 2014 A progressive planned e-safety education programme takes place through discrete lessons and across the curriculum, for all children in all years, and is regularly revisited. Breadth and progression is ensured through implementation of the Wessex computing planning and the e-safety progression that is part of the Wessex Computing planning. Within this:

key e-safety messages are reinforced through assemblies, Safer Internet Week (February), anti-bullying week (November) and throughout all lessons

pupils are taught to keep themselves safe online and to be responsible in their use of different technologies as detailed in the Wessex Computing Planning

pupils are guided to use age appropriate search engines for research activities. Staff are vigilant in monitoring the content of the websites visited and encourage pupils to use specific search terms to reduce the likelihood of coming across unsuitable material

in lessons where Internet use is pre-planned, pupils are guided to sites checked as suitable for their use and processes are in place for dealing with any unsuitable material that is found in Internet searches

pupils are taught to be critically aware of the content they access online and are guided to validate the accuracy and reliability of information

pupils are taught to acknowledge the source of information used and to respect copyright when using material accessed on the Internet

pupils are taught about current issues such as online gaming, extremism, vlogging and obsessive use of technology, where appropriate

pupils will sign an AUP for their class at the beginning of each school year, which will be shared with parents and carers

pupils are educated to recognise and respond appropriately to ‘different forms of bullying, including cyber-bullying’

9

Page 27: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

27

Education and information for parents and carers Parents and carers will be informed about the ways the Internet and technology is used in school. They have a critical role to play in supporting their children with managing e-safety risks at home, reinforcing key messages about e-safety and regulating their home experiences. The school supports parents and carers to do this by:

providing clear AUP guidance which they are asked to sign with their children and regular newsletters, Curriculum Information Meetings, website update;

raising awareness through activities planned by pupils;

inviting parents to attend meetings as appropriate;

providing and maintaining links to up to date information on the school website

Education of wider school community The school provides information about e-safety to organisations using school facilities, Pre-School and members of the wider community which where appropriate include:

details about the Online Compass review tool

e-safety messages targeted to grandparents and other relatives

Training of Staff and Governors There is a planned programme of e-safety training for all staff and governors to ensure they understand their responsibilities, as outlined in this, and the AUPs. This includes:

an annual audit of the e-safety training needs of all staff

all new staff and governors receiving e-safety training as part of their induction programme

providing information to supply and student teachers on the school’s e-safety procedures

the e-safety Leader receiving regular updates through attendance at SWGfL and LA training sessions and by reviewing regular e-safety newsletters from the LA

this e-safety Policy and its updates being shared and discussed in staff meetings and in Governor meetings

the e-safety Leader providing guidance and training as required to individuals and seeking LA support on issues

staff and governors are made aware of the UK Safer Internet Centre helpline 0844 381 4772

Cyberbullying Cyberbullying (along with all other forms of bullying) of any member of the school community will not be tolerated. Full details are set out in the school’s policy on anti-bullying and behaviour.

The school will follow procedures in place to support anyone in the school community affected by cyberbullying.

Pupils and staff are made aware of a range of ways of reporting concerns about cyberbullying e.g. telling a trusted adult, Online bully box, Childline Phone number 0800 1111.

Pupils, staff and parents and carers will be encouraged to report any incidents of cyberbullying and advised to keep electronic evidence. All incidents of cyberbullying reported to the school will be recorded by the school.

The school will follow procedures to investigate incidents or allegations of cyberbullying.

The school will take steps where possible and appropriate, to identify the bully. This may include examining school system logs, identifying and interviewing possible witnesses, and contacting the service provider and the police.

Page 28: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

28

Pupils, staff and parents and carers will be required to work with the school to support the approach to cyberbullying and the school’s e-safety ethos.

Sanctions for those involved in cyberbullying will follow those for other bullying incidents and may include:

the bully being asked to remove any material deemed to be inappropriate or the service provider being contacted to remove content if the bully refuses or is unable to delete content

Internet access being suspended at the school for a period of time. Other sanctions for pupils and staff may also be used in accordance to the schools anti-bullying, behaviour policy or AUP

the parent and carers of pupils being informed

the police being contacted if a criminal offence is suspected

Technical Infrastructure The person(s) responsible for the school’s technical support and those with administrator access to systems will sign a technician’s AUP, in addition to the staff AUP. The school ensures, when working with our technical support provider that the following guidelines are adhered to:

the School ICT systems are managed in ways that ensure that the school meets e-safety technical requirements

there are regular reviews and audits of the safety and security of school ICT systems.

appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations and other devices from accidental or malicious attempts which might threaten the security of the school systems and data with regard to: o the downloading of executable files by users o the extent of personal use that users (staff/community users) and their family

members are allowed on laptops and other portable devices used out of school o the installing programs on school devices unless permission is given by the technical

support provider or Computing/ICT coordinator o the use of removable media (e.g. memory sticks) by users on school devices. (see

School Data Protection Policy for further detail) o the installation of up to date virus software

access to the school network and Internet will be controlled with regard to: o users having clearly defined access rights to school ICT systems through group

policies o pupil users being provided with a username o staff users being made aware that they are responsible for the security of their

username and password which they are required to change every 60 days; they must not allow other users to access the systems using their log on details

o the ‘master/administrator’ passwords are available to the Headteacher and kept in the school safe

o users must immediately report any suspicion or evidence that there has been a breach of security

o an agreed process being in place for the provision of temporary access of “guests” (e.g. trainee or supply teachers, visitors) onto the school system. All “guests” must sign the staff AUP and are made aware of this e-safety policy

o Key Stage 1 pupils’ access will be supervised with access to specific and approved online materials

o Key Stage 2 pupils’ will be supervised. Pupils will use age-appropriate search engines and online tools and activities

the Internet feed will be controlled with regard to:

14

Page 29: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

29

o the school maintaining a managed filtering service provided by an

educational provider o the school monitoring Internet use o requests from staff for sites to be removed from the filtered list being approved by

the Senior Leadership Team and logged using a proforma o requests for the allocation of extra rights to users to by-pass the school’s proxy

servers being recorded, agreed and logged o filtering issues being reported immediately

the IT System of the school will be monitored with regard to: o the school IT technical support regularly monitoring and recording the activity of

users on the school IT systems o e-safety incidents being documented and reported immediately to the Headteacher

or e-safety Leader who will arrange for these to be dealt with immediately in accordance with the AUP

Data Protection The schools Data Protection Policy provides full details of the requirements that need to be met in relation to the Data Protection Act 1998. The school will:

at all times take care to ensure the safe keeping of personal data, minimising the risk of its loss or misuse

use personal data only on secure password protected computers and other devices

ensure that users are properly ‘logged-off’ at the end of any session in which they are accessing personal data

store or transfer data using approved services such as remote access, the Somerset Learning Platform (SLP), encryption and secure password protected devices

make sure data is deleted from the device or SLP once it has been transferred or its use is complete

Use of digital and video images Photographs and video taken within school are used to support learning experiences across the curriculum, to share learning with parents and carers on our school’s learning platform and to provide information about the school on the website. The school will:

when using digital images, instruct staff to educate pupils about the risks associated with the taking, use, sharing, publication and distribution of images including on social networking sites

allow staff to take images to support educational aims, but follow guidance in the acceptable use policy concerning the sharing, distribution and publication of those images

make sure that images or videos that include pupils will be selected carefully with their knowledge

seek permission from parents or carers before images or videos of pupils are electronically published

Encourage pupils to seek permission from other pupils to take, use, share, publish or distribute images of them without their permission

all parties must recognise that any published image could be reused and repurposed make sure that pupils’ full names will not be used anywhere on the school website,

particularly in association with photographs, unless permission has been given in advance not publish pupils’ work without their permission and the permission of their parents keep the written consent where pupils’ images are used for publicity purposes, until the

image is no longer in use publish a policy regarding the use of photographic images of children which outlines

policies and procedures including disposal and deletion

15

Page 30: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

30

Communication (including use of Social Media) A wide range of communications technologies have the potential to enhance learning. The school will:

with respect to email ensure that the school uses a secure business email system for communication

ensure that personal information is not sent via unsecure email

ensure that governors use a secure email system

ensure that any digital communication between staff and pupils or parents and carers is professional in tone and content

make users aware that email communications will be monitored by the school

inform users what to do if they receive an email that makes them feel uncomfortable, is offensive, threatening or bullying in nature

use email at KS1 through a group or class activity with an adult sending and opening emails

provide pupils at Key Stage 2 with a monitored individual educational school email addresses as needed

teach pupils about email safety issues through the scheme of work and implementation of the AUP

only publish official staff email addresses where this required

with respect to social media e.g. Facebook, Twitter, blogging and personal publishing

enable online learning opportunities to make use of age appropriate educationally focussed sites that will be moderated by the school

control access to social media and social networking sites in school

have a process to support staff who wish to use social media in the classroom to safely set up and run a class blog/Twitter/YouTube account to share learning experiences

provide staff with the tools to risk assess sites before use and check the sites terms and conditions to ensure a) the site is age appropriate b) whether content can be shared by the site or others without additional consent being given

ensure that any digital communication between staff and pupils or parents and carers is always professional in tone and content

discuss with staff the personal use of email, social networking, social media and personal publishing sites as part of staff induction, building an understanding of safe and professional behaviour in line with Teaching Standards 2012

staff are advised that no reference should be made to pupils, parents/carers or school staff

advise all members of the school community not to publish specific and detailed private thoughts, especially those that may be considered threatening, hurtful or defamatory

register concerns (e.g. recording in e-safety log) regarding pupils’ inappropriate use of email, social networking, social media and personal publishing sites (in or out of school) and raise with their parents and carers, particularly when concerning pupils’ underage use of sites

support staff to deal with the consequences of hurtful or defamatory posts about them online

inform the staff that in the case of a Critical Incident they should not make any comment on social media without the permission of the senior management team

with respect to mobile phones

inform staff that personal mobile phones should only be used at break, lunchtimes and in restricted areas when they are not in contact with pupils’, unless they have the permission of the Headteacher

Page 31: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

31

inform staff that they are not allowed to use personal devices to take photographs or video in school for any purpose without the express permission of the Senior Leadership Team

inform all that personal devices should be password protected

advise staff not to use their personal mobile phone to contact pupils, parents and carers

inform visitors of the schools expectations regarding the use of mobile phones The following table shows how the school considers the way these methods of communication should be used.

Staff & other adults Pupils

Communication Technologies Allo

wed

Allo

wed a

t cert

ain

tim

es

Allo

wed f

or

sele

cte

d

sta

ff

Not a

llow

ed

Allo

wed

Allo

wed a

t cert

ain

tim

es

Allo

wed w

ith s

taff

perm

issio

n

Not a

llow

ed

Mobile phones may be brought to school

Use of mobile phones in lessons

Use of mobile phones in social time

Taking photos on mobile phones or other camera devices

Use of personal devices

Use of personal email addresses in school, or on school network

Use of school email for personal emails

Use of chat rooms / facilities

Use of messaging apps

Use of social networking sites

Use of blogs

Use of Twitter

Use of video broadcasting eg Youtube

Assessment of risk Methods to identify, assess and minimise risks will be reviewed regularly. As technology advances the school will examine and adjust the e-safety Policy. Part of this consideration will include a risk assessment:

looking at the educational benefit of the technology considering whether the technology has access to inappropriate material

However, due to the global and connected nature of Internet content, it is not possible to guarantee that access to unsuitable material will never occur via a school computer. Neither the school nor Somerset County Council can accept liability for the material accessed, or any consequences resulting from Internet use.. All users need to be reminded that the use of computer systems, without permission or for inappropriate purposes, could constitute a criminal offence under the Computer Misuse Act 1990 and breaches will be reported to Police.

17

Page 32: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

32

Reporting and Response to incidents The school will follow Somerset’s flowcharts to respond to illegal and inappropriate incidents as listed in those publications. More than one member of staff (at least one should be a senior leader) will be involved in this process and the same designated computer will be used for the duration of any investigation. All sites and content checked will be recorded and screen shots, signed and dated, will be kept where this is appropriate. Should content being reviewed include images of Child abuse then the monitoring will be halted and referred to the Police immediately. All members of the school community will be informed about the procedure for reporting e-safety

concerns (such as breaches of filtering, cyberbullying, illegal content) The e-safety Leader or Headteacher will record all reported incidents and actions taken in the

School e-safety incident log and in any other relevant areas e.g. Bullying or Child Protection log The designated Child Protection Coordinator will be informed of any e-safety incidents involving

child protection concerns, which will then be escalated in accordance with school procedures The school will manage e-safety incidents in accordance with the School Behaviour Policy where

appropriate The school will inform parents and carers of any incidents or concerns in accordance with school

procedures After any investigations are completed, the school will debrief, identify lessons learnt and

implement any changes required Where there is cause for concern or fear that illegal activity has taken place or is taking place then

the school will contact Somerset Children Safeguarding Team and escalate the concern to the police

If the school is unsure how to proceed with any incidents of concern, then the incident may be escalated to the Safeguarding for Schools Adviser, Local Authority Designated Officer (LADO) or Senior Education Technology Adviser If an incident or concern needs to be passed beyond the school then the concern will be escalated to the Safeguarding for Schools Adviser and eLIM 01823 356839 to communicate to other schools in Somerset. Should serious e-safety incidents take place, the following external persons and agencies should be informed:

Safeguarding for Schools Adviser Via Somerset Direct where pupil involved

Local Authority Designated Officer (LADO) Via Somerset Direct where staff involved

Police

Senior Education Technology Adviser Lucinda Searle 01823 356839

The police will be informed where users visit Internet sites, make, post, download, upload, data transfer, communicate or pass on, material, remarks, proposals or comments that contain or relate to:

child sexual abuse images promotion or conduct of illegal acts, under the child protection, obscenity, computer misuse and

fraud legislation adult material that potentially breaches the Obscene Publications Act in the UK criminally racist material, verbally abusive or threatening material information which is false and

known or believed by the sender to be false

Sanctions and Disciplinary proceedings Sanctions and disciplinary procedures may be taken where users visit Internet sites, make, post, download, upload, data transfer, communicate or pass on, material, remarks, proposals or comments that contain or relate to (unless this is part of an investigation (p 17):

Child Sexual abuse images Grooming, incitement, arrangement or facilitation of sexual acts against children Contrary

to the Sexual Offences Act 2003. pornography, adult or mature content promotion of any kind of discrimination, racial or religious hatred personal gambling or betting personal use of auction sites any site engaging in or encouraging illegal activity threatening behaviour, including promotion of physical violence or mental harm any other information which may be offensive to colleagues or breaches the integrity of

the ethos of the school or brings the school into disrepute

Page 33: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

33

using school systems to run a private business use systems, applications, websites or other mechanisms that bypass

the filtering or other safeguards employed by the school uploading, downloading or transmitting commercial software or any copyrighted materials

belonging to third parties, without the necessary licensing permissions revealing or publicising confidential or proprietary information (e.g. financial or personal

information, databases, computer or network access codes and passwords) creating or propagating computer viruses or other harmful files carrying out sustained or instantaneous high volume network traffic (downloading or

uploading files) that causes network congestion and hinders others in their use of the Internet

In addition the following indicates school policy on these uses of the Internet:

Acceptable Acceptable at

certain times

Acceptable for

nominated users

Unacceptable

Online gaming (educational)

Online gaming (non-educational)

Online gambling

Online shopping / commerce

File sharing (using p2p networks)

Sanctions: Pupils The 2011 Education Act increased powers with regard to the searching for and of electronic devices and the deletion of data. These are applied through the school’s Behaviour Policy.

Incidents

Refe

r to

cla

ss t

eacher

/ tu

tor

Refe

r to

Headte

acher

Refe

r to

Polic

e

Refe

r to

technic

al support

sta

ff f

or

actio

n r

e f

ilterin

g / s

ecurity

etc

Info

rm p

are

nts

/ c

are

rs

Rem

oval of

netw

ork

/ I

nte

rnet access

rig

hts

Warn

ing

Fu

rther

sanctio

n e

g d

ete

ntio

n /

exclu

sio

n

Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable / inappropriate activities).

Unauthorised use of non-educational sites during lessons

Unauthorised use of mobile phone / digital camera / other handheld device

Unauthorised use of social networking / instant messaging / personal email

Unauthorised downloading or uploading of files

Attempting to access or accessing the school network, using another pupil’s account

Corrupting or destroying the data of other users

Continued infringements of the above, following previous warnings or sanctions

Accidentally accessing offensive material and failing to report the incident

Page 34: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

34

Sanctions: Staff

Incidents:

Refe

r to

Head teacher

Refe

r to

Local A

uth

ority

/ H

R

Refe

r to

LA

DO

(L)/

Polic

e(P

)

Refe

r to

Te

chnic

al S

upport

Sta

ff f

or

actio

n r

e f

ilterin

g e

tc

Warn

ing

Dis

cip

linary

actio

n

Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable / inappropriate activities).

L,P

Excessive or inappropriate personal use of the Internet / social networking sites / instant messaging / personal email

Unauthorised downloading or uploading of files

Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account

Careless use of personal data e.g. holding or transferring data in an insecure manner

Deliberate actions to breach data protection or network security rules

Corrupting or destroying the data of other users or causing deliberate damage to hardware or software

Sending an email, text or instant message that is regarded as offensive, harassment or of a bullying nature staff

Sending an email, text or instant message that is regarded as offensive, harassment or of a bullying nature to learners L

Breech of the school e-safety policies in relation to communication with learners L

Using personal email / social networking / instant messaging / text messaging to carry out digital communications with pupils? L

Actions which could compromise the staff member’s professional standing

Actions which could bring the school into disrepute or breach the integrity of the ethos of the school

Using proxy sites or other means to subvert the school’s filtering system

Accidentally accessing offensive or pornographic material and failing to report the incident L

Deliberately accessing or trying to access offensive or pornographic material L

Breaching copyright or licensing regulations

Continued infringements of the above, following previous warnings or sanctions

Page 35: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

35

Appendix 1

Timberscombe and Cutcombe

First Schools

Acceptable User Policies (October 2015)

Staff

Volunteer

Technician

Visitor

Occasional Visitor

Page 36: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

36

Staff and Volunteer Acceptable Use Policy School Policy

This Acceptable Use Policy reflects the school e-safety policy.The school will ensure that staff

and volunteers will have good access to ICT to enable efficient and effective working, to enhance

learning opportunities for pupils and will, in return, expect staff and volunteers to agree to be

responsible users.

Scope of Policy

This Acceptable User Policy (AUP) applies to staff, volunteers and guests who have access to

school ICT systems and to school related use of ICT systems outside of school.

My Responsibilities

I agree to:

read, understand, sign and act in accordance with the School e-safety policy

report any suspected misuse or concerns to the e-safety Leader

monitor ICT activity in lessons, extracurricular and extended school activities

model the safe use of technology

demonstrate consistently high standards of personal and professional conduct

especially in relation to use of social networks making sure that these are in line with

school ethos and policies especially at the time of a Critical Incident Education I agree to:

provide appropriate e-safety learning opportunities as part of a progressive e-safety

curriculum

respect copyright and educate the pupils to respect it as well Training I agree to:

participate in e-safety training

request training if I spot an opportunity to improve on my professional abilities Cyberbullying I agree to:

ensure the schools zero tolerance of bullying. In this context cyberbullying is seen as

no different to other types of bullying.

report any incidents of bullying in accordance with school procedures Technical Infrastructure I understand that the school will monitor my use of computers and the internet. I will not try

to by-pass any of the technical security measures that have been put in place by the school. These

measures include:

the proxy or firewall settings of the school network (unless I have permission)

not having the rights to install software on a computer (unless I have permission)

not using removable media (unless I have permission)

Passwords

I will never log another user onto the system using my login

Filtering

I will not try to by-pass the filtering system used by the school

If I am granted special access to sites that are normally filtered I will not leave my

computer unsupervised

I will report any filtering issues immediately

Page 37: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

37

Data Protection I understand my responsibilities towards the Data Protection Act and will

ensure the safe keeping of personal data at all times.

I will ensure that all data held in personal folders is regularly backed up.

Use of digital images

I will follow the school’s policy on using digital images especially in making sure that only

those pupils whose parental permission has been given are published. Communication I will be professional in all my communications and actions when using school ICT systems.

Email

I will use the school provided email for all business matters.

I will not open any attachments to emails, unless the source is known and trusted (due to the

risk of the attachment containing viruses or other harmful programmes).

Social Media and Personal Publishing

I will ask permission before I use social media with pupils or for other school related work.

I will follow the e-safety policy concerning the personal use of social media.

On any personal accounts I will not post any comments about any pupil and not post

disparaging remarks about my employer/colleagues.

When there is a Critical Incident I will not post any comments online.

Mobile Phones

I will not use my personal mobile phone during contact time with pupils.

I will not use my personal mobile phone to contact pupils or parents.

Reporting incidents

I will report any incidents relating to e-safety to the e-safety Leader or Headteacher.

I will make a note of any incidents in accordance with school procedures.

I understand that in some cases the Police may need to be informed.

Sanctions and Disciplinary procedures

I understand that there are regulations in place when pupils use ICT and that there are

sanctions if they do not follow the rules.

I understand that if I misuse the School ICT systems in any way then there are disciplinary

procedures that will be followed by the school. I have read and understand the full School e-safety policy and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) in a responsible and professional manner as outlined in that document.

Staff/Volunteer Name ________________________________________________

Signed ____________________________________________________

Date ____________________________

Page 38: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

38

Technician Acceptable Use Policy Extension

The school ICT Technician or person with administration rights is placed in an exceptional

position of trust. Many of the duties that the Headteacher expects these people to

complete could be against the Staff Acceptable User Policy of the school.

This document is not a job description but an addition to the Staff Acceptable User Policy

that allows the ICT technician to fulfil these duties. Schools should customise this document

to fit their needs.

Areas of concern are that:

Files may be created, imported or processed by staff and pupils and stored on the

school’s servers or other storage systems (e.g.USB memory sticks, SD cards etc.) that

might be of an inappropriate nature to the school setting. Inappropriate use includes

any production, processing or transmission of offensive, provocative, racist, unethical,

irreligious or anti-social materials in any format. Also included in this area are any

materials that are against the rules and conditions of service for the school e.g.

material that might bring the establishment into disrepute. Work created during the

school’s time or on the school’s equipment or on one’s own equipment but for school

work, belongs to the school.

User accounts will need to be created and serviced meaning that there may be access

to these accounts by the ICT technician.

Through work within the school’s administration network the ICT Technician may be

placed in the position of assisting in the processing of confidential information

including children’s health or MIS data, confidential letters or information from or to

senior staff, budgeting plans etc.

The ICT technicians through specific user names and password have control,

(sometimes through remote workstations) to the schools network. In the past there

have been examples where these powers have been abused.

Because of these areas of concern the ICT Technician should:

be responsible for monitoring the school’s network.

be given permission to access other user’s files.

protect the users by maintaining a filter for the school.

monitor the internet use of users within the school.

be aware of the laws relating to the use of computers especially those around Data

Protection, Copyright and those referred to in the school’s e-safety Policy and AUPs.

Page 39: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

39

make sure that they record all user names and passwords for all

the services they access in a place where the senior leaders in the

school can access them.

have their use of the school’s network, internet and other aspects of their work open

for scrutiny.

To enable them to discharge these duties they should:

receive training on the sensitive nature of their job especially in relation to Data

Protection and the confidentiality of information.

have an agreed procedure for managing the internet filter. This should include a log

of decisions made.

have an agreed understanding of what is expected of them as far as the regular

monitoring of the network system and internet.

have agreed procedures for reporting incidents.

log any incidents including minor ones that are quickly resolved.

be careful to make sure that they are observed when investigating serious incidents to

make sure that they are protected against any allegations that could arise (e.g. never

open websites that are suspected of having inappropriate material unless others are

present).

have frequent meetings with their line manger to report on any issues or trends.

As an ICT Technician (or a person who has similar responsibilities) I have read the above

document and understand that I will be directed by senior staff to complete work outside of

the Staff Acceptable User Policy.

I will report all concerns I have to the appropriate member of Senior Management.

Name: __________________________________________________________

Signed: __________________________________________________________

Senior Member of Staff: ___________________________________________

Date: __________________

Page 40: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

40

Visitor Acceptable Use Policy Visitors should apply certain standards when using computer equipment in schools.

These standards should include an awareness of Data Protection and Copyright laws.

Logging in

If you use the school’s equipment then request a guest log in.

If you are using equipment that has been logged in by a member of staff always ensure

a member of staff is present. Always lock the machine if they need to leave the room.

If your service contract (Network/MIS support) allows you access to the system

through team logins inform the school how you will be accessing the system.

Wireless Access

Request permission to use the wireless connection (if available) asking for an

authorisation key. You may need to change proxy settings.

Remember that bandwidth is limited so avoid intensive use such as large downloads.

Internet Access and uploading

The schools Internet connection is filtered so access might be denied to some sites.

Seek permission to access sites that are unavailable through the schools normal

filtering system. This might not be possible as changes to the filter can take some

time.

You are responsible for the sites that appear on any machine that you are using. Report

any issues with the member of staff present.

Never upload and install software or updates without permission from a member of

staff.

If you use your own equipment:

Make sure that it has up to date virus protection software installed.

That you take care with trailing wires.

That you can identify your equipment.

Never leave your equipment unattended or in an unlocked room.

Downloading files or documents

For all files

Make sure that the USB stick/external hard drive has recently been virus checked.

Never transfer files unless you have permission.

Make sure that you clearly state the purpose for transferring these files.

Check to see if the school machine you would like to transfer files from or to is

encrypted as it might automatically encrypt your USB stick/hard disc drive.

If the file contains sensitive personal data such as staff or student information

Get permission for this in writing or by email.

Page 41: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

41

(Note: Where existing service contracts (Network/MIS support)

indicate that this type of work will take place permission will not be

needed).

Use an encrypted memory stick or hard drive.

Transfer the file only over a secure email connection.

If you take pictures, video or sound files then check

That you have permission to capture these files.

That the staff/children have all given their permission for these images/voices to be

used.

That if you intend to use these files in a public area (website, blog etc.) or for financial

gain that you request this permission in writing or through email.

Name: ______________________________________

Signed: ____________________________________

Date ______________________

Page 42: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

42

Occasional Visitors e-safety agreement

Appendix 2 Pupil Acceptable Use Policy Examples (please note, these are screen shots of Communicate in Print Documents,

these are also available as PDF files)

On signing the visitors’ book you agree to:

only log onto the school network with the user name and password provided for you;

inform the Headteacher or their representative if you intend to use the Internet, asking permission before using any kind of social media with the children;

refrain from any use of your personal mobile phone or other device during the working day;

not taking any photographs;

report any suspected misuse or concerns about e-safety whether by pupils or staff, to the Headteacher or their representative before leaving the school;

not taking any information on pupils or staff off site unless specific permission has been given by the Headteacher or their representative;

not publishing any information online that may be offensive to staff or pupils, or may bring the school into disrepute.

Page 43: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

43

Page 44: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

44

Page 45: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

45

Pupil Acceptable Use Policy

To help keep myself ‘e-safe’ at school I will do the following: 1. I will ask the teacher or assistant if I am unsure about anything

on the screen.

2. I will ask an adult if I am about to use the computer or internet. 3. I will not use my personal details on the computer. 4. I will not use chat rooms. 5. I will only use websites and search engines that I have been

advised to use. 6. I will turn off the screen and then tell a teacher if any pictures

or words come on to the screen that make me feel uncomfortable.

Signed: __________________________ Date: ____________________________

Page 46: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

46

Appendix B: Guidance on the use of technology for communications between staff and learners 1. Introduction

1.1. Communication between children learners and adult staff should always take place within clear and explicit professional boundaries. This includes all communication using technology, including mobile phones, text messaging, emails, digital cameras, videos, web-cams, websites and blogs.

1.2. This guidance specifies acceptable and permissible modes of communication. 2. Scope of Guidance

2.1. This guidance is written for Educational establishments in Somerset, including Schools and FE Colleges.

2.2. This guidance covers use of technology for communication. 2.3. In addition to this guidance, Schools are encouraged to have the following policies:

2.3.1. E-safety policy – this policy should cover use of ICT, particularly the Internet, by staff and learners.

2.3.2. Acceptable Use policy, ensuring staff and volunteers are responsible ICT users. 3. Contact Details

3.1. Staff should not give their personal contact details to learners, including their personal mobile telephone number or home email address, unless the need to do so is agreed with senior management and parents/carers.

4. Methods of Contacting Learners

4.1. Staff should only use equipment provided by their organisation to communicate with children, e.g. work mobile phones, work email address.

4.2. Schools should consider including in their home/school agreements, permission to use these forms of communication with learners

4.3. Staff should not use social networking sites (e.g. Facebook) to communicate with learners, or others with whom they are in a position of trust.

4.4. It is not appropriate for staff , using any form of technology, to “friend” learners or add them to their contact lists; this may give the learners access to personal information and allow them to contact staff members inappropriately. It may also give access to staff members personal information and activities.”

5. Content of communication

5.1. When staff are in a position of trust, they should only make contact with learners for professional reasons and in accordance with any organisation policy.

5.2. As with any other communication between staff and learners : 5.2.1. The onus is on the adult and not learner to distance themselves from any

potentially inappropriate situation. 5.2.2. Emails or text messages of an inappropriate or personal nature should not be

sent. 5.2.3. An appropriate balance of formality and informality must be maintained at all

times. 5.2.4. All staff should consider that high volume of communication could be interpreted

as harassment.

Page 47: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

47

5.2.5. Sexual remarks towards a learner are inappropriate regardless of their age or apparent consent.

5.2.6. Staff’s personal and private relationships should not be discussed with pupils. 6. References: South West Grid for Learning www.swgfl.org.uk/safe Guidance for Safer Working Practice for Adults who work with Children and Young People in Education Settings (DCSF - Dec 2008) Code of Professional Conduct for Teachers – GTC for England www.gtce.org.uk/documents/publicationpdfs/conduct_code_pccpt1007.pdf Code of Professional Conduct for Teachers – GTC for Scotland www.gtcs.org.uk/nmsruntime/saveasdialog.aspx?lID=3386&sID=4912 National Union of Teachers Code of Conduct www.suffolknut.org.uk/conduct.htm Cyberbullying: Supporting School Staff http://publications.teachernet.gov.uk/eOrderingDownload/cyberbullying-staff.pdf

Page 48: Child Protection, Safeguarding & E-Safety Policy · Child Protection and Safeguarding Policy June 2016 Page 4 of 48 2 Introduction 2.1 Our schools accept safeguarding children and

Child Protection and Safeguarding Policy June 2016 Page 48 of 48

Online Safety Flowchart