child protection, safeguarding & e-safety policy · child protection and safeguarding policy...
TRANSCRIPT
Child Protection and Safeguarding Policy June 2016 Page 1 of 48
Child Protection, Safeguarding & E-Safety Policy
(Including practice guidance)
2016
This policy should be taken as part of the overall strategy of the school and implemented
within the context of our vision, aims and values as Church of England Schools. “Building on our Christian Foundation, and in partnership with our school and wider
communities, we live, love and learn together in God's ever-changing world” Designated Safeguarding Lead in each school is: Cutcombe: Marcus Capel Designated Deputy Lead: Paula Gay (01643) 841462 Timberscombe: Marcus Capel Designated Deputy Lead: Tamsin Blackmore (01643) 841259
Safeguarding Governor: Paula Gay
“Safeguarding children is everybody’s business” (Lord Laming)
Policy Review Date: 29.6.16
The Beacon Federation of Cutcombe and Timberscombe Church of England First Schools
“Live, Love and Learn Together”
Child Protection and Safeguarding Policy June 2016 Page 2 of 48
Contents Page
1 Forward 3
2 Introduction 4
3 The Policy and Guidance 4
4 Reporting concerns (procedures) 5
5 Framework 5
6 The role of Schools and their Leadership Team 6
7 Child Abuse 8
7.1 Introduction 8
7.2 Physical abuse 8
7.3 Emotional abuse 8
7.4 Sexual abuse 8
7.5 Neglect 9
7.6 Domestic abuse 10
7.7 Child Sexual Exploitation (CSE) 10
7.8 Radicalisation 11
7.9 Female Genital Mutilation (FGM) 11
7.10 Forced Marriage 11
7.11 On-line 12
8 Confidentiality 12
9 Records and Monitoring 13
10 Attendance at Child Protection conferences 13
11 Safe Children, Safe Staff 13
12 Useful Information 15
Appendix A: School safeguarding leads 16
Appendix B: Child Protection procedure checklist for school 16 staff
Appendix C: Prompt sheet for Child Protection referrals 17
Appendix D: Procedures if an allegation is made against a 18
member of school staff
Appendix E: Process map for school staff reporting a concern 19
of a vulnerable individual
Appendix F: What to do if you are worried a child is being 21
abused
Appendix G: LSCB Escalation Policy 22 Appendix H: ECF E-Safety Policy 2015 25
Child Protection and Safeguarding Policy June 2016 Page 3 of 48
1 Forward
Our Schools recognise that the safety and welfare of children is paramount and that we have a responsibility to protect children in all our schools’ activities. We take all reasonable steps to ensure, through appropriate procedures and training, that all children, irrespective of sex, age, disability, race, religion or belief, sexual identity or social status, are protected from abuse.
We will seek to:
Create a safe and welcoming environment where children can develop their skills and confidence.
Support and encourage other groups and organisations to implement similar policies.
Recognise that safeguarding children is the responsibility of everyone, not just those who work with children.
Ensure that any training or events are managed to the highest possible safety standards
Review ways of working to incorporate best practice. Including this policy being regularly reviewed and updated to reflect current best practice and Government expectations.
Treat all children with respect regardless of age, disability, gender, racial heritage, religious belief, sexual orientation or identity.
Carefully recruit and select all employees, contractors and volunteers.
Respond swiftly and appropriately to all complaints and concerns about poor practice or suspected or actual child abuse.
Share information about concerns with agencies who need to know, and
involving parents and children appropriately
This Safeguarding Policy relates to all school employees or staff working within our schools and is in addition to the Working Together & Keeping Children Safe in Education 2016 guides. This policy document is produced in order to inform and assist our staff and contractual partners in meeting their responsibilities in terms of child protection, whether working directly or indirectly for our school.
Child Protection and Safeguarding Policy June 2016 Page 4 of 48
2 Introduction 2.1 Our schools accept safeguarding children and young people is a key element
within our work. All staff are all familiar with the requirements of “Working Together to Safeguard Children: A Guide to Interagency Working to Safeguard and Promote the Welfare of Children” (statutory guidance revised 2015) & Keeping Children Safe in Education (revised 5th September 2016) as all staff undertake regular safeguarding.
2.2 The Director of Children’s Services, within the Local Authority has the
overarching responsibility for safeguarding and promoting the welfare of all children and young people in the area. They have a number of statutory functions under the Children Acts 1989 and 2004 which make this clear. This policy is to add detail to schools expectations of staff to expect specific duties to happen in relation to children in need and children suffering, or likely to suffer, significant harm, regardless of where they are or who takes any further action.
2.3 The Director of Children’s Services and Lead Member for Children’s Services
in local authorities are the key points of professional and political accountability, with responsibility for the effective delivery of these functions. (Working together to Safeguard Children 2015)
“Children are best protected when professionals are clear about what is required of them individually, and how they need to work together.” (Working together to Safeguard Children 2015)
2.4 This school fully recognises its responsibilities for child protection. Though
the risk of child abuse cannot be eliminated, all schools staff strive to reduce the risk as far as is reasonably possible. This policy is designed to help achieve these aims and keep our children safe, happy and free from harm while discharging statutory duties in promoting the welfare of children and young people.
3 The Policy & Guidance 3.1 Schools recognise there are three main elements to Child Protection.
Prevention - through support and guidance offered by schools staff involved directly with children and young people.
Protection - by following agreed procedures, ensuring staff are appropriately recruited, trained and supported to respond sensitively and swiftly to Child Protection concerns.
Support - to children and young people who may have been abused or neglected, directly or through those who work directly with, or care for them.
Child Protection and Safeguarding Policy June 2016 Page 5 of 48
4 Reporting Concerns (procedures) 4.1 Where it is believed that a child or young person is suffering from, or is at risk
of, significant harm, schools staff follow the procedures set out in the South West Child Protection Procedures (www.swcpp.org.uk) and the Somerset Safeguarding Children Board (SSCB) documents which can be found at http://www.proceduresonline.com/swcpp/somerset/index.html
4.2 These procedures clearly confirm that the welfare of the child is of paramount
importance and takes precedence over sensitivities about relations with partners, parents, or the likely reaction of others in the community, and any wish a child might have for complete confidentiality (which cannot be guaranteed).
4.3 Members of staff not following procedures could put themselves at risk of
disciplinary action and the child concerned at risk. As long as the procedures are adhered to, members of staff will receive the full support of school and the Local Authority.
4.4 Section 6 of this document explains the types of abuse schools staff may
come in contact with; though the list is not exhaustive. However, all schools staff will be aware of this through their safeguarding training.
4.5 If, via the schools employee’s professional judgement or discussion with their
manager or Designated Safeguarding Lead (DSL), they believe a child or young person is suffering or likely to suffer, then a referral should be made to Somerset Direct on 0300 123 2224.
4.6 In many cases the concerns do not reach the threshold for a Child Protection
Referral but that of a Child in Need of an earlier intervention. 4.7 This is the function of the Early Help Assessment (Common Assessment
Framework – CAF) and Team Around the Child meeting. This will identify a lead professional who will bring appropriate professionals together to empower the family to address concerns raised. Details of this process are available at: http://www.somerset.gov.uk/policies-and-plans/strategies/common-assessment-framework-caf/
4.8 There is a document Child Protection Procedure Checklist for Schools Staff
set as Appendix B that will help make your assessment. 5 Framework 5.1 Schools recognise they do not operate in isolation. The welfare of children
and young people is not just the responsibility of the Local Authority but a partnership with other public agencies, the voluntary sector and service users and carers.
Child Protection and Safeguarding Policy June 2016 Page 6 of 48
5.2 Child Protection is the responsibility of all adults, especially those working with children and young people. The development of appropriate procedures and the monitoring of good practice are the responsibilities of the SSCB.
6 The role of School and the Leadership Team 6.1 Schools and their Leadership Teams recognise their responsibilities with
regard to Child Protection and to safeguarding and promoting the welfare of children and young people.
6.2 Schools have a Designated Safeguarding Lead (DSL) who is the lead officer
for their individual school or federation of schools. In addition to this every school will have a named deputy safeguarding lead. Staff should take all daily case concerns to their line manager as first point of contact.
6.3 Schools Leadership Teams will:
Recognise how to identify signs of abuse and know which outside child protection agency to contact in the event of a child protection matter coming to their attention.
Ensure all schools staff have basic awareness training in Safeguarding and Child Protection or Introduction to Child Protection Training. For those who are trained at “Working Together”, (previously called level 2), this will need to be refreshed every two years, by attending Update Training (previously called Level 3).
Act as a source of advice to ensure schools staff are up to date with relevant policies and practices or changes in legislation.
Determine the level of training staff should receive in each school appropriate to their level of work. Schools Leadership Teams will ensure staff have appropriate and refresher training as required. Each school’s leadership team will manage for their school. The DSL will monitor this process to ensure schools are monitoring training. (Such monitoring ensures schools comply with section 11 of The Children Act (2004) which places duties on a range of organisations and individuals to ensure that their functions – and any services that they contract out to others – are discharged having regard to the need to safeguard and promote the welfare of children).
Ensure that appropriate information is available at the time of referral and that the referral is confirmed in writing under confidential cover.
Liaise with Somerset Direct, Local Children’s Social Care and other agencies, as appropriate.
Act as a source of advice and expertise and keep school colleagues informed about any action taken and any further action required.
Ensure that a proper record is kept of any referral and action taken, and that this is kept safely and in confidence.
Manage and deliver staff child protection training and review the operation of the Child Protection Policy annually to ensure the procedures are working and that it complies with current best practice. The DSL will report to the School’s Leadership Team quarterly on any issues with regard to the implementation of this policy.
Child Protection and Safeguarding Policy June 2016 Page 7 of 48
6.4 The Schools’ designated safeguarding lead is Marcus Capel Details can be
found in Appendix A. 6.5 This policy applies to all staff working in schools. Key elements to this policy:
Establishing positive, supportive, secure working practices that put children first.
Ensuring we practise safer recruitment in checking the suitability of all staff who work in schools. .
Keeping child protection issues at the forefront of our work and know who in the school is the DSL.
Ensuring that schools implement procedures for identifying and reporting cases, or suspected cases of abuse and regularly reviews them.
Supporting children and young people in accordance with his/her agreed child protection plan.
We will follow the procedures set out by the SSCB and take account of all guidance issued by the DfE, OfSTED and other significant bodies.
Ensure we have a DSL and a Deputy who have received appropriate training and support for their role (training in child protection and inter-agency working must be carried out every two years for schools staff at the appropriate level). In addition to this we will ensure every school has a DSL and deputy and staff are reminded termly who these people are.
Develop effective links with relevant agencies and co-operate as required with their enquiries regarding child protection matters including attendance at case conferences, if appropriate.
Keep written, dated and signed records of concerns about children, even where there is no need to refer the matter immediately. This includes the use of any screening tool that aids identification of Child Sexual Exploitation (CSE), radicalisation, Female Genital Mutilation (FGM), on-line use or other such issues and that such record is securely placed. See section 6.7.7.
Follow procedures where an allegation is made against a member of schools staff and that such procedures are robust to deal with any allegation and that clear records of investigations and outcomes of allegations are held on staff files. This will include contacting Somerset Direct and possibly discussion with the Local Authority Designated Officer (LADO). Notify appropriate bodies or their designated authority within one month when the services of a person are discontinued because he/she were considered unsuitable to work with children.
Risk-assess any off-site activity, led by schools.
Schools staff will escalate any safeguarding concerns via the appropriate process and address any of its own deficiencies or weaknesses to ensure the child’s safety is paramount.
6.6 Schools staff and their Leadership Team will therefore:
Child Protection and Safeguarding Policy June 2016 Page 8 of 48
Promote an ethos where children and young people feel secure and are encouraged to use their preferred means of communication, and are understood by adults using inclusive communication skills and strategies. (See European Convention on Human Rights and Health and Social Care Act 2012).
Promote approaches to ensure that children and young people know which adults they can approach if they are worried or are in difficulty.
Promote approaches and activities, when appropriate, which equip children and young people with the skills they need to stay safe from abuse and which will help them develop realistic attitudes to the responsibilities of adult life.
Ensure that, wherever possible, every effort will be made to establish effective working relationships with parents and colleagues from other agencies.
7 Child Abuse 7.1 Introduction 7.1.1 All schools staff are alert to the possible signs of abuse of a child or young
person due to their regular safeguarding training. Forms of abuse are: 7.2 Physical abuse 7.2.1 Physical abuse may involve hitting, shaking, throwing, poisoning, burning or
scalding, drowning, suffocating, or otherwise causing physical harm to a child. Physical harm may also be caused when a parent or carer fabricates the symptoms of, or deliberately induces, illness in a child.
7.2.2 Where your concern is about physical abuse, make sure you note where on
the body the injury is and describe shape and size. Be careful to record the factual evidence – i.e. what you can actually see, not your opinion of how the injury may have been sustained.
7.3 Emotional abuse
7.3.1 Emotional abuse is the persistent emotional maltreatment of a child such as to cause severe and persistent adverse effects on the child’s emotional development.
7.3.2 It may involve conveying to children that they are worthless or unloved,
inadequate, or valued only insofar as they meet the needs of another person. It may include not giving the child opportunities to express their views, deliberately silencing them or ‘making fun’ of what they say or how they communicate. It may feature age or developmentally inappropriate expectations being imposed on children. These may include interactions that are beyond the child’s developmental capability, as well as overprotection and limitation of exploration and learning, or preventing the child participating in normal social interaction. It may involve seeing or hearing the ill-treatment of another. It may involve serious bullying (including cyber bullying), causing children frequently to feel frightened or in danger, or the exploitation or
Child Protection and Safeguarding Policy June 2016 Page 9 of 48
corruption of children. Some level of emotional abuse is involved in all types of maltreatment of a child, though it may occur alone.
7.3.3 Emotional abuse is hard to evidence so detail a number of events that have
led to your concerns.
7.4 Sexual abuse
7.4.1 Sexual abuse involves forcing or enticing a child or young person to take part in sexual activities, not necessarily involving a high level of violence, whether or not the child is aware of what is happening. The activities may involve physical contact, including assault by penetration (for example, rape or oral sex) or non-penetrative acts such as masturbation, kissing, rubbing and touching outside of clothing. They may also include non-contact activities, such as involving children in looking at, or in the production of, sexual images, watching sexual activities, encouraging children to behave in sexually inappropriate ways, or grooming a child in preparation for abuse (including via the internet). Sexual abuse is not solely perpetrated by adult males. Women can also commit acts of sexual abuse, as can other children.
7.4.2 If the child or young person discloses to you any such incident record in as
much detail as possible what was said, who was there and the child or young person’s emotional state throughout the disclosure. Make sure your notes are contemporaneous, dated and kept securely.
7.5 Neglect
7.5.1 Neglect is the persistent failure to meet a child’s basic physical and/or psychological needs, likely to result in the serious impairment of the child’s health or development. Neglect may occur during pregnancy as a result of maternal substance abuse. Once a child is born, neglect may involve a parent or carer failing to:
provide adequate food, clothing and shelter (including exclusion from home or abandonment);
protect a child from physical and emotional harm or danger;
ensure adequate supervision (including the use of inadequate care-givers); or
ensure access to appropriate medical care or treatment. 7.5.2 It may also include neglect of, or unresponsiveness to a child’s basic
emotional needs. 7.5.3 If you are to refer a child or young person because of possible neglect, always
check back to see if there have been any previous concerns. The Children Act 1989 talks about how the persistent neglect of very basic needs is likely to cause an impairment in the child or young person’s development.
Child Protection and Safeguarding Policy June 2016 Page 10 of 48
7.6 Domestic abuse 7.6.1 Domestic abuse may take many forms. Witnessing the physical and
emotional suffering of a parent may cause considerable distress to children and both the physical assaults and psychological abuse suffered by adult victims who experience domestic abuse can have a negative impact on their ability to look after their children. Children can still suffer the effects of domestic abuse, even if they do not witness the incidents directly. However in up to 90% of incidents involving domestic violence where children reside in the home, the children are in the same or the next room. Children's exposure to parental conflict, even where violence is not present, can lead to serious anxiety and distress among children. Children can see school as a safe retreat from problems at home or alternatively not attend school through a perceived need to be at home to protect abused parents or siblings.
7.6.2 Domestic abuse can therefore have a damaging effect on a child's health,
educational attainment and emotional well-being and development. The potential scale of the impact on children is not always easy to assess but may manifest itself as behavioural, emotional or social difficulties, including poor self-esteem, withdrawal, absenteeism, adult-child conflict. Children sometimes disclose what is happening or may be reluctant to do so hoping that someone will realise something is wrong.
7.6.3 Always think through whether the case in question fits more appropriately
within a ‘Child in Need’ framework than within a Child Protection framework. (For example, mucky children may simply come from mucky families; clearly the family needs to do something about the child’s cleanliness and appearance, and may need some support in this, but it might not be the case that the child or young person is being abused and in need of protection.)
7.7 Child Sexual Exploitation (CSE) 7.7.1 There will be other circumstances which give cause for serious concern about
the welfare of pupils; such as Child Sexual Exploitation (CSE). 7.7.2 The sexual exploitation of children and young people under 18 involves
exploitative situations, contexts and relationships where young people (or a third person or persons) receive something (e.g. food, accommodation, drugs, alcohol, cigarettes, affections, gifts, money) as a result of them performing, and/or another or others performing on them, sexual activities.
7.7.3 Child sexual exploitation can occur through the use of technology without the
child's immediate recognition; for example being persuaded to post sexual images on the internet/mobile phones without immediate payment or gain.
7.7.4 In all cases those exploiting the child/young person have power over them by
virtue of their age, gender, intellect, physical strength and/or economic or other resources.
Child Protection and Safeguarding Policy June 2016 Page 11 of 48
7.7.5 Violence, coercion and intimidations are common, involvement in exploitative relationships being characterised in the main by the child's or young person’s limited availability of choice resulting from their social/economic and/or emotional vulnerability.
7.7.6 While professional judgement may lead you to refer this matter to Somerset Direct a screening tool has been developed that may help an SSE employee in their judgement.
7.7.7 There are fuller details around this subject including access to the screening tool at https://slp.somerset.org.uk/sites/somersetlscb/
7.8 Radicalisation
7.8.1 The UK Government since the 2011 Prevent review defines extremism as: ‘vocal or active opposition to fundamental British values, including democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs. We also include in our definition of extremism calls for the death of members of our armed forces.
7.8.2 Radicalisation is defined by the UK Government within this context as “the process by which a person comes to support terrorism and extremist ideologies associated with terrorist groups.”
7.8.3 If you become concerned that this may raise a professional concern about a young person you work with or know then Appendix E will help you raise this with appropriate persons.
7.9 Female Genital Mutilation (FGM) 7.9.1 FGM comprises all procedures that involve partial or total removal of the
external female genitalia, or other injury to the female genital organs for non-medical reasons (World Health Organisation). It is also sometimes referred to as female genital cutting or female circumcision. The practice is illegal in the UK.
7.10 Forced Marriage 7.10.1The UK Government describe this as taking someone, usually overseas, to
force them to marry (whether or not the forced marriage takes place) or marrying someone who lacks the mental capacity to consent to the marriage (whether they're pressured to or not). Breaching a Forced Marriage Protection Order is also a criminal offence.
Child Protection and Safeguarding Policy June 2016 Page 12 of 48
7.11 On-line 7.11.1 Mobile phones, laptops, iPads, and other on-line type products are integrated
into all our lives. However, there are those that seek to use these for their own or others gratification. The link below provides more information on on-line safety and cover issues such as:
Bullying, including online bullying and prejudice-based bullying, racialization and/or extremist behaviour
Child sexual exploitation and trafficking
The impact of new technologies on sexual behaviour, for example sexting.
http://swgfl.org.uk/news/News/E-Safety/Making-Sense-of-the-New-Online-Safety-Standards
7.11.2 Schools, via e-Learning and Information Management (eLIM) and the LSCB
and the South West Grid for Learning, will consider any improper use as a possible safeguarding concern, which should be considered as child protection issues and discussed with your line manager or DSL as appropriate.
Appendix F is a flow chart to help staff in considering whether to make a Child Protection referral.
8 Confidentiality 8.1 Confidentiality needs to be discussed and fully understood by all those
working with children, particularly in the context of child protection. No adult must ever guarantee confidentiality to any child or young person. Staff should make children and young people aware that if they disclose information that may be harmful to themselves or others, then certain actions will need to be taken.
8.2 Personal information will only be disclosed to third parties (including other
agencies) with the consent of the subject of that information (Data Protection Act 1998, European Convention on Human Rights, Article 8). Wherever possible, consent should be obtained before sharing personal information with third parties. In some circumstances, obtaining consent may not be possible or in the best interest of the child or young person, e.g., where safety and welfare of that child or young person necessitates that the information should be shared. The law permits the disclosure of confidential information necessary to safeguard a child or children. Disclosure should be justifiable in each case, according to the particular facts of the case, and legal advice should be sought if in doubt.
Child Protection and Safeguarding Policy June 2016 Page 13 of 48
9 Records and Monitoring 9.1 Well-kept records are essential to good child protection practice. Schools are
clear about the need to record any concerns held about children or young people, the status of such records and when these records should be passed over to other agencies.
9.2 In our work with children, young people and families, and others in an
advisory and support role, we will promote all institutions to:
Keep clear detailed written records of concerns about children and young people.
Ensure all records are kept secure and in a locked location.
Ensure records are passed on to the receiving institution if a child or young
person transfers. 9.3 Schools written notes/records of any child protection issues regarding
individual children and young people will be kept securely and separately electronically. Where necessary we ensure that child protection information has been passed on to Somerset Direct appropriately.
10 Attendance at Child Protection Conferences 10.1 If a child or young person becomes the subject in a Child Protection
Conference you may be asked to share information about the child or young person and his/her family. Usually this will be in the form of a written report, the contents of which will be shared with parents/carers prior to the meeting.
10.2 Occasionally, there may be information which is confidential and which will be
shared in a closed meeting prior to the conference. If this is necessary, the chair of the conference will discuss the matter with parents/carers beforehand.
10.3 When any child or young person becomes the subject of a conference, local
procedures require all other children in the family are considered. It may well be that staff will be required to provide information on children with whom there appear to be no direct concerns.
10.4 Staff may contribute to the process of risk assessment and the decision about
the child being in receipt of a child protection plan. 11 Safe Children - Safe Staff 11.1 When recruiting staff schools leadership teams will ensure all appropriate
checks are made. It is important to remember that:
Child Protection and Safeguarding Policy June 2016 Page 14 of 48
All staff are an adult role model for children: courteous, friendly and kind. No member of staff should make suggestive or discriminatory or other inappropriate comments.
All staff should respect children at all times regardless of their sex, ethnicity,
disability or sexual orientation.
All staff should use social network appropriately, this includes only using official work accounts to promote work and never referring to individual children. Further information can be found on the eLIM website. https://slp.somerset.org.uk/sites/edtech/SitePages/e-Safety/Social%20Networks.aspx
Staff must never allow or engage in inappropriate verbal or physical contact of
any description.
Staff should not allow children or adults to engage in abusive activities, ridiculing, bullying etc electronically or face to face.
Managers must develop an ethos that allows staff to feel comfortable and
caring enough to point out any inappropriate attitudes or behaviour to each other.
All staff should ensure that when working individually with a child or young
person, they should be mindful of safe working practices, (e.g. where possible doors are left open), other staff are aware they are working on a one to one basis, and immediate help is available if needed.
All staff should report disclosures or concerns.
Staff should never trivialise a child abuse issue.
Staff should not drive a child or young person home without permission of the
parent/carer and line manager.
No member of staff should ever take a young person to their own home. In any one-to-one situation that is not a clear and proper part of your work, you put yourself at risk of false allegations.
Child Protection and Safeguarding Policy June 2016 Page 15 of 48
12 Useful Information
12. 1 This policy should be read in conjunction with other related policies such as:
1. Recruitment and Selection 2. Management of Allegations Against Staff 3. Behaviour Management 4. Anti-Bullying 5. Physical Interventions 6. Health and Safety 7. Safeguarding and ICT 8. Use of Photography and Videos 9. Drugs and Substance Misuse 10. Equal Opportunities 11. First Aid (including management of medical conditions) 12. Racial Equality
12.2 Useful Websites
www.somersetsafeguardingchildrenboard.org.uk 12.3 Useful Phone Numbers
1. Somerset Direct 0300 123 2224
2. The Education Safeguarding team at County Hall, Taunton
Tony Waller: Service Manager, Safeguarding and Education Welfare Service 1823 355941 Jane Weatherill: Education Safeguarding Advisor 01823 355014 [email protected]
Kate Kift: Early Years Education Safeguarding Advisor 07977401307 / [email protected] Kieran Canham: Project Support Assistant. Kieran has moved across from the Education Welfare Central Team to support safeguarding. He will be monitoring Safeguarding Notifications and Children with No Provision. He will also be attending the County’s MASH panel and MISPER panels and will be contacting Education providers directly should any issues arise regarding these panels
3. Local Authority Designated Officer (LADO)
Antony Goble 01823 357727
APPENDIX A: Schools’ Safeguarding Leads
Schools’ Designated Lead is Marcus Capel
Schools’ Deputy Designated Leads are: Tamsin Blackmore & Paula Gay
Child Protection and Safeguarding Policy June 2016 Page 16 of 48
APPENDIX B: Child Protection procedure checklist for Schools Staff. If:
A child or young person discloses abuse, or You suspect a child may have been abused, or You witness an abusive situation involving another professional.
You RECORD AND REPORT Respond without showing any signs of disquiet, anxiety or shock. Enquire casually about how an injury was sustained or why a child appears upset. Confidentiality must not be promised to children or adults in this situation. Observe carefully the demeanour of behaviour of the child or young person. Record in detail what has been seen and heard. Do not interrogate or enter into detailed investigations: rather, encourage the child or young person to say what he wants until enough information is gained to decide whether or not a referral is appropriate. Asking questions is fine to help understand what the issue is. Ensure the questions are open and give the child the ability to clarify. It is important NOT to ask leading questions. It is important to know when to stop asking questions and listen. It is important not to interrogate. Types of Questions you can ask:
Tell me (tell me what happened)
Explain (explain what you meant by)
Where did this happen/where were you
When did this happen
Remember you are only clarifying with the young person if something concerning did happen or could have happened from the information they give you.
Then REPORT to Somerset Direct (it may be helpful to discuss potential referrals with your line manager and/or the designated person without delay). Appendix F is a flow chart that will help staff in their deliberations as to whether to make a referral. Schools staff MUST NOT
Investigate suspected/alleged abuse themselves;
Evaluate the grounds for concern;
Seek or wait for proof;
Discuss the matter with anyone other than their line manager, Somerset Direct, designated person and, as appropriate e.g. the Headteacher.
Children’s Social Care & the Police are the only agencies that can investigate allegations of abuse. Escalation Process - Resolution of professional disagreements in work relating to the safety of children. Occasionally, there may be some professional disagreement as to whether child protection concerns meet thresholds etc. There is an escalation process document that is available on the LSCB web site, see Appendix G.
Child Protection and Safeguarding Policy June 2016 Page 17 of 48
APPENDIX C: Prompt sheet for Child Protection referrals Somerset Direct may ask you to complete the Common Request for Involvement form. This prompt sheet will help you bring together all necessary information before picking up the phone. Before making a referral through the locally agreed procedures, the following information should be available: Child’s details
Name, including any middle names and, if the child is known by more than one name; list all names known.
Date of birth. Address and telephone number. Health issues that may be relevant. Any known disabilities that may affect communication.
Family details Names of parents and/or carers. Names and ages of any other children in family. Ethnicity and cultural background and where appropriate information about
the need for interpreters. Any legal or custody documents known to exist. Name of the family’s GP.
School/provision history How long has the child attended this provision? Attendance record – check if there has been a problem with attendance, look
out for any patterns that emerge from attendance records, i.e. some children have been reported to miss every Monday because there have been problems at the weekend.
Behaviour – how does the child present? Check for any repeated patterns of behaviour, or sudden changes of behaviour. Do these relate to a change in circumstances at home?
Relationships with parents, school, other agencies: good, non-existent, volatile?
Child protection history Have you had previous concerns and have you made previous referrals? It is
important to revisit previous concerns to get a wider picture. Child protection services are reliant on other agencies to help them build up a clearer picture of what has been happening. The relationship between each event may be more significant than each individual event.
If you have referred in the past, what was the outcome? Never let the fact that no action was taken last time affect your way of managing new concerns. If you have a concern, always pass it on.
Informing the parent In most cases it is agreed that it is better to tell the parent that you intend to refer to Children’s Social Care or the Police but think it through. If you think telling may put the child or young person at more risk, take advice first. If in doubt, ring Somerset Direct (0845 3459122) and discuss with the Duty Social Worker. Making the referral Once there is all the necessary information available a child protection referral can be made with confidence, following the South West Child Protection Procedures (www.swcpp.org.uk). Record all your actions and responses from other agencies.
Child Protection and Safeguarding Policy June 2016 Page 18 of 48
APPENDIX D Procedures if an allegation is made against a member of Schools staff Never let allegations by a child or young person go unrecorded or unreported, including any made against you. In all instances the Designated Person or deputy must be informed. If the allegation concerns the Designated Person, then the Schools Leadership Team must be informed. In all situations the County HR contact and the Local Authority Designated Officer for Allegations Management, (LADO) must be informed. They can be contacted via Somerset Direct. If you receive a disclosure, about an adult colleague, it is important to reassure the child that what he says will be taken very seriously and everything possible done to help. If you are in the room when a child or young person begins to disclose concerns to another person, you should stay unobtrusively in the background. You may be able to support/witness what has been said if required. Remember: value your professional judgement.
Child Protection and Safeguarding Policy June 2016 Page 19 of 48
APPENDIX E: Process map for Schools staff reporting a concern of a vulnerable individual
Prevent and Channel
It is important for you as a member of staff to know where to go if you have a concern that someone may be on the route to radicalisation. Below is a flow
chart which aims to show the process as to which you can follow:
Member of staff identifies concern.
Concern reported to Schools Safeguarding Lead or Line Manager
Safeguarding with member of staff gather more information where possible and
identifies what further action is required
If there is no
immediate risk
If there an is immediate risk call 999
1. Speak with Somerset Direct
Or your other options are:
2. Call 101 and ask for Local Policing
Team
3. Contact your Regional Police Prevent & Channel Lead
(DI Mandy Pilling 07585307109 or DI Sam Norman 07881268432)
4. Email: [email protected]
.police.uk
5. Call the Anti-terrorist
Hotline on 0800 789 321
Child Protection and Safeguarding Policy June 2016 Page 20 of 48
Further information gathering with your institution and other key agencies that the individual is involved with. Are there shared concerns between partners?
Is there a vulnerability to radicalisation?
Police will organise a Multi-Agency Channel meeting which will be made of key partners. The meeting will be
chaired by your Local Authority.
Implement support plan depending on level of risk.
Regularly review process – Channel Panel members work together to review progress
and reduce risks.
The individual will exit the Channel process when all partner agencies feel that
the vulnerability to radicalisation has been completely removed or significantly lessened.
If it is deemed there is low risk –
further action within normal support. Key
agency progresses with further monitoring.
Yes
No
It is important to remember that consent is gained with the individual
to be part of Channel support and intervention.
Once a referral has exited the process, it will be reviewed at 6 and 12 months. If concerns remain, the individual can be
re-referred.
Child Protection and Safeguarding Policy June 2016 Page 21 of 48
APPENDIX F: What to do if you are worried a child is being abused
Useful Information and contacts: Somerset Direct: 0300 123 2224 [email protected] Local Safeguarding Children Board website ‘What to do if you are worried a child is being abused’ – government document ‘Key messages in Child Protection’ – Somerset LSCB
No further child protection action. May need to ensure necessary services are
provided by own agency or other agency. Record discussion. Consider
CAF / getset.
Discuss with Designated Safeguarding Lead
Concerns remain
Member of staff has concerns about a child’s welfare
In an emergency call 999 Discuss with line manager
No longer have concerns
Concerns remain
Referencing the LSCB threshold document:
Follow the Child Sexual Exploitation Screening Tool
process
Initiate a Early Help Ass Phone Somerset Direct with the concerns and follow up with an email
within 48 hours [email protected]
0300 123 2224
Child Protection and Safeguarding Policy June 2016 Page 22 of 48
APPENDIX G: LSCB escalation policy The below link is for the Local Safeguarding Children Board’s escalation policy that provides resolution of professional disagreements in work relating to the safety of children.
https://slp.somerset.org.uk/sites/somersetlscb/LSCB%20Documents/Escalation%20Policy.pdf
23
Appendix H – E-Safety Policy and Acceptable Use Policy
Exmoor Coast Federation e-Safety Policy
This policy sets out the ways in which the school will:
educate all members of the school community on their rights and responsibilities with the use of technology;
build both an infrastructure and culture of e-safety;
work to empower the school community to use the Internet as an essential tool for life-long learning.
This policy is used in conjunction with other school policies and has been developed by a working group, which included representatives from all groups within the school. The e-safety policy will be reviewed annually and will be under continuous revision in response to significant new developments in the use of technologies, new threats to e-safety or incidents that have taken place.
Contents Scope of policy................................................................................................................................... 24 Schedule for Development, Monitoring and Review ......................................................................... 24 Roles and responsibilities................................................................................................................... 24
Education of pupils ............................................................................................................................ 26 Education and information for parents and carers ............................................................................. 27 Education of wider school community .............................................................................................. 27 Training of Staff and Governors ........................................................................................................ 27 Cyberbullying................................................................................................................................... 277
Technical Infrastructure ................................................................................................................... 288 Data Protection ................................................................................................................................. 299 Use of digital and video images ....................................................................................................... 299 Communication (including use of Social Media) .............................................................................. 30 Assessment of risk ............................................................................................................................. 31
Reporting and Response to incidents ................................................................................................. 32 Sanctions and Disciplinary proceedings ............................................................................................ 32 Sanctions: Pupils ................................................................................................................................ 33 Sanctions: Staff .................................................................................................................................. 34
Acceptable Use Policies 35
24
Scope of policy This policy applies to all members of the school community, including staff, pupils, volunteers, parents/carers, visitors and community users. The Education and Inspections Act 2006 empowers Headteachers, to such extent as is reasonable, to regulate the behaviour of pupils when they are off the school site and empowers members of staff to impose disciplinary penalties for inappropriate behaviour. This is pertinent to incidents such as cyber-bullying, which may take place out of school, but are linked to membership of the school. The schools will manage e-safety as described within this policy and associated behaviour and anti-bullying policies, and will inform parents and carers of known incidents of inappropriate e-safety behaviour that take place in and out of school.
Schedule for Development, Monitoring and Review The Implementation of the e-safety policy will be monitored by an e-safety working group including the headteacher and e-safety governor, who will report to the governing body. The impact of the policy will be monitored by the e-safety working group by looking at:
the log of reported incidents
the Internet monitoring log
surveys or questionnaires of learners, staff, parents and carers
other documents and resources
future developments
Roles and responsibilities The Headteacher is responsible for ensuring the safety (including e-safety) of all members of the school community. The e-safety Leader will work with the Headteacher and the designated Safeguarding Lead [in these schools this is the same person], to have an overview of the serious child protection issues that arise from sharing of personal data, access to illegal or inappropriate materials, inappropriate online contact with adults, potential or actual incidents of grooming and cyber-bullying.
An e-safety working group will work as necessary with the e-safety Leader to implement and monitor the e-safety policy and AUPs (Acceptable User Policies).
Role Responsibility Governors Approve and review the effectiveness of the e-safety Policy
Delegate a governor to act as e-safety link
e-safety Governor and Headteacher works with the e-safety Leader to carry out regular monitoring and report to Governors
Head Teacher
Ensure that all staff receive suitable CPD to carry out their e-safety roles
Create a culture where staff and learners feel able to report incidents
Ensure that there is a progressive e-safety curriculum in place
Ensure that there is a system in place for monitoring e-safety
Follow correct procedure in the event of a serious e-safety allegation being made against a member of staff or pupil
Inform the local authority about any serious e-safety issues
Ensure that the school infrastructure/network is as safe and secure as possible
Ensure that policies and procedures approved within this policy are implemented
Use an audit to annually review e-safety with the school’s technical support (Simon Capp)
25
e-safety Leader
Lead the e-safety working group
Together with the Headteacher, log, manage and inform others of e-safety incidents and how they have been resolved where this is appropriate
Lead the establishment and review of e-safety policies and documents
Lead and monitor a progressive e-safety curriculum for pupils
Ensure all staff are aware of the procedures outlined in policies relating to e-safety
Provide and/or broker training and advice for staff
Attend updates and liaise with the LA e-safety staff and technical staff
Meet with Senior Leadership Team and e-safety Governor to regularly discuss incidents and developments
Coordinate work with the school’s designated Child Protection Coordinator
Teaching and Support Staff
Participate in any training and awareness raising sessions
Read, understand and sign the Staff AUP
Act in accordance with the AUP and e-safety Policy
Report any suspected misuse or concerns to the e-safety Leader and check this has been recorded
Provide appropriate e-safety learning opportunities as part of a progressive e-safety curriculum and respond
Model the safe use of technology
Monitor ICT activity in lessons, extracurricular and extended school activities
Demonstrate consistently high standards of personal and professional conduct especially in relation to use of social networks, making sure that these are in line with school ethos and policies, including at the time of a Critical Incident
Pupils Read, understand and sign the Pupil AUP and the agreed class Internet rules
Participate in e-safety activities, follow the AUP and report concerns for themselves or others
Understand that the e-safety Policy covers actions out of school that are related to their membership of the school
Parents and Carers
Endorse (by signature) the Pupil AUP
Discuss e-safety issues with their child(ren) and monitor their home use of technology (including tablets, mobile phones and games devices) and the Internet
Access the school website in accordance with the relevant school AUP
Keep up to date with issues through newsletters, attendance at curriculum Information Meetings and other opportunities
Inform the Headteacher of any e-safety issues that relate to the school
Maintain responsible standards when using social media to discuss school issues
Technical Support
Ensure the school’s ICT infrastructure is as secure as possible and is protected from misuse or malicious attack
8
26
Provider
Ensure users may only access the school network through an enforced password protection policy
Maintain and inform the Senior Leadership Team of issues relating to filtering
Keep up to date with e-safety technical information and update others as relevant
Ensure use of the network is regularly monitored in order that any misuse can be reported to the e-safety Leader for investigation
Ensure monitoring systems are implemented and updated
Ensure all security updates are applied (including anti-virus and Windows)
Sign an extension to the Staff AUP detailing their extra responsibilities
Community Users
Sign and follow the Guest/Staff AUP before being provided with access to school systems
Education of pupils Pupils to ‘understand what constitutes unsafe situations and are highly aware of how to keep themselves and others safe in different situations including in relation to e-safety’
School Inspection Handbook - Ofsted 2014 A progressive planned e-safety education programme takes place through discrete lessons and across the curriculum, for all children in all years, and is regularly revisited. Breadth and progression is ensured through implementation of the Wessex computing planning and the e-safety progression that is part of the Wessex Computing planning. Within this:
key e-safety messages are reinforced through assemblies, Safer Internet Week (February), anti-bullying week (November) and throughout all lessons
pupils are taught to keep themselves safe online and to be responsible in their use of different technologies as detailed in the Wessex Computing Planning
pupils are guided to use age appropriate search engines for research activities. Staff are vigilant in monitoring the content of the websites visited and encourage pupils to use specific search terms to reduce the likelihood of coming across unsuitable material
in lessons where Internet use is pre-planned, pupils are guided to sites checked as suitable for their use and processes are in place for dealing with any unsuitable material that is found in Internet searches
pupils are taught to be critically aware of the content they access online and are guided to validate the accuracy and reliability of information
pupils are taught to acknowledge the source of information used and to respect copyright when using material accessed on the Internet
pupils are taught about current issues such as online gaming, extremism, vlogging and obsessive use of technology, where appropriate
pupils will sign an AUP for their class at the beginning of each school year, which will be shared with parents and carers
pupils are educated to recognise and respond appropriately to ‘different forms of bullying, including cyber-bullying’
9
27
Education and information for parents and carers Parents and carers will be informed about the ways the Internet and technology is used in school. They have a critical role to play in supporting their children with managing e-safety risks at home, reinforcing key messages about e-safety and regulating their home experiences. The school supports parents and carers to do this by:
providing clear AUP guidance which they are asked to sign with their children and regular newsletters, Curriculum Information Meetings, website update;
raising awareness through activities planned by pupils;
inviting parents to attend meetings as appropriate;
providing and maintaining links to up to date information on the school website
Education of wider school community The school provides information about e-safety to organisations using school facilities, Pre-School and members of the wider community which where appropriate include:
details about the Online Compass review tool
e-safety messages targeted to grandparents and other relatives
Training of Staff and Governors There is a planned programme of e-safety training for all staff and governors to ensure they understand their responsibilities, as outlined in this, and the AUPs. This includes:
an annual audit of the e-safety training needs of all staff
all new staff and governors receiving e-safety training as part of their induction programme
providing information to supply and student teachers on the school’s e-safety procedures
the e-safety Leader receiving regular updates through attendance at SWGfL and LA training sessions and by reviewing regular e-safety newsletters from the LA
this e-safety Policy and its updates being shared and discussed in staff meetings and in Governor meetings
the e-safety Leader providing guidance and training as required to individuals and seeking LA support on issues
staff and governors are made aware of the UK Safer Internet Centre helpline 0844 381 4772
Cyberbullying Cyberbullying (along with all other forms of bullying) of any member of the school community will not be tolerated. Full details are set out in the school’s policy on anti-bullying and behaviour.
The school will follow procedures in place to support anyone in the school community affected by cyberbullying.
Pupils and staff are made aware of a range of ways of reporting concerns about cyberbullying e.g. telling a trusted adult, Online bully box, Childline Phone number 0800 1111.
Pupils, staff and parents and carers will be encouraged to report any incidents of cyberbullying and advised to keep electronic evidence. All incidents of cyberbullying reported to the school will be recorded by the school.
The school will follow procedures to investigate incidents or allegations of cyberbullying.
The school will take steps where possible and appropriate, to identify the bully. This may include examining school system logs, identifying and interviewing possible witnesses, and contacting the service provider and the police.
28
Pupils, staff and parents and carers will be required to work with the school to support the approach to cyberbullying and the school’s e-safety ethos.
Sanctions for those involved in cyberbullying will follow those for other bullying incidents and may include:
the bully being asked to remove any material deemed to be inappropriate or the service provider being contacted to remove content if the bully refuses or is unable to delete content
Internet access being suspended at the school for a period of time. Other sanctions for pupils and staff may also be used in accordance to the schools anti-bullying, behaviour policy or AUP
the parent and carers of pupils being informed
the police being contacted if a criminal offence is suspected
Technical Infrastructure The person(s) responsible for the school’s technical support and those with administrator access to systems will sign a technician’s AUP, in addition to the staff AUP. The school ensures, when working with our technical support provider that the following guidelines are adhered to:
the School ICT systems are managed in ways that ensure that the school meets e-safety technical requirements
there are regular reviews and audits of the safety and security of school ICT systems.
appropriate security measures are in place to protect the servers, firewalls, routers, wireless systems, work stations and other devices from accidental or malicious attempts which might threaten the security of the school systems and data with regard to: o the downloading of executable files by users o the extent of personal use that users (staff/community users) and their family
members are allowed on laptops and other portable devices used out of school o the installing programs on school devices unless permission is given by the technical
support provider or Computing/ICT coordinator o the use of removable media (e.g. memory sticks) by users on school devices. (see
School Data Protection Policy for further detail) o the installation of up to date virus software
access to the school network and Internet will be controlled with regard to: o users having clearly defined access rights to school ICT systems through group
policies o pupil users being provided with a username o staff users being made aware that they are responsible for the security of their
username and password which they are required to change every 60 days; they must not allow other users to access the systems using their log on details
o the ‘master/administrator’ passwords are available to the Headteacher and kept in the school safe
o users must immediately report any suspicion or evidence that there has been a breach of security
o an agreed process being in place for the provision of temporary access of “guests” (e.g. trainee or supply teachers, visitors) onto the school system. All “guests” must sign the staff AUP and are made aware of this e-safety policy
o Key Stage 1 pupils’ access will be supervised with access to specific and approved online materials
o Key Stage 2 pupils’ will be supervised. Pupils will use age-appropriate search engines and online tools and activities
the Internet feed will be controlled with regard to:
14
29
o the school maintaining a managed filtering service provided by an
educational provider o the school monitoring Internet use o requests from staff for sites to be removed from the filtered list being approved by
the Senior Leadership Team and logged using a proforma o requests for the allocation of extra rights to users to by-pass the school’s proxy
servers being recorded, agreed and logged o filtering issues being reported immediately
the IT System of the school will be monitored with regard to: o the school IT technical support regularly monitoring and recording the activity of
users on the school IT systems o e-safety incidents being documented and reported immediately to the Headteacher
or e-safety Leader who will arrange for these to be dealt with immediately in accordance with the AUP
Data Protection The schools Data Protection Policy provides full details of the requirements that need to be met in relation to the Data Protection Act 1998. The school will:
at all times take care to ensure the safe keeping of personal data, minimising the risk of its loss or misuse
use personal data only on secure password protected computers and other devices
ensure that users are properly ‘logged-off’ at the end of any session in which they are accessing personal data
store or transfer data using approved services such as remote access, the Somerset Learning Platform (SLP), encryption and secure password protected devices
make sure data is deleted from the device or SLP once it has been transferred or its use is complete
Use of digital and video images Photographs and video taken within school are used to support learning experiences across the curriculum, to share learning with parents and carers on our school’s learning platform and to provide information about the school on the website. The school will:
when using digital images, instruct staff to educate pupils about the risks associated with the taking, use, sharing, publication and distribution of images including on social networking sites
allow staff to take images to support educational aims, but follow guidance in the acceptable use policy concerning the sharing, distribution and publication of those images
make sure that images or videos that include pupils will be selected carefully with their knowledge
seek permission from parents or carers before images or videos of pupils are electronically published
Encourage pupils to seek permission from other pupils to take, use, share, publish or distribute images of them without their permission
all parties must recognise that any published image could be reused and repurposed make sure that pupils’ full names will not be used anywhere on the school website,
particularly in association with photographs, unless permission has been given in advance not publish pupils’ work without their permission and the permission of their parents keep the written consent where pupils’ images are used for publicity purposes, until the
image is no longer in use publish a policy regarding the use of photographic images of children which outlines
policies and procedures including disposal and deletion
15
30
Communication (including use of Social Media) A wide range of communications technologies have the potential to enhance learning. The school will:
with respect to email ensure that the school uses a secure business email system for communication
ensure that personal information is not sent via unsecure email
ensure that governors use a secure email system
ensure that any digital communication between staff and pupils or parents and carers is professional in tone and content
make users aware that email communications will be monitored by the school
inform users what to do if they receive an email that makes them feel uncomfortable, is offensive, threatening or bullying in nature
use email at KS1 through a group or class activity with an adult sending and opening emails
provide pupils at Key Stage 2 with a monitored individual educational school email addresses as needed
teach pupils about email safety issues through the scheme of work and implementation of the AUP
only publish official staff email addresses where this required
with respect to social media e.g. Facebook, Twitter, blogging and personal publishing
enable online learning opportunities to make use of age appropriate educationally focussed sites that will be moderated by the school
control access to social media and social networking sites in school
have a process to support staff who wish to use social media in the classroom to safely set up and run a class blog/Twitter/YouTube account to share learning experiences
provide staff with the tools to risk assess sites before use and check the sites terms and conditions to ensure a) the site is age appropriate b) whether content can be shared by the site or others without additional consent being given
ensure that any digital communication between staff and pupils or parents and carers is always professional in tone and content
discuss with staff the personal use of email, social networking, social media and personal publishing sites as part of staff induction, building an understanding of safe and professional behaviour in line with Teaching Standards 2012
staff are advised that no reference should be made to pupils, parents/carers or school staff
advise all members of the school community not to publish specific and detailed private thoughts, especially those that may be considered threatening, hurtful or defamatory
register concerns (e.g. recording in e-safety log) regarding pupils’ inappropriate use of email, social networking, social media and personal publishing sites (in or out of school) and raise with their parents and carers, particularly when concerning pupils’ underage use of sites
support staff to deal with the consequences of hurtful or defamatory posts about them online
inform the staff that in the case of a Critical Incident they should not make any comment on social media without the permission of the senior management team
with respect to mobile phones
inform staff that personal mobile phones should only be used at break, lunchtimes and in restricted areas when they are not in contact with pupils’, unless they have the permission of the Headteacher
31
inform staff that they are not allowed to use personal devices to take photographs or video in school for any purpose without the express permission of the Senior Leadership Team
inform all that personal devices should be password protected
advise staff not to use their personal mobile phone to contact pupils, parents and carers
inform visitors of the schools expectations regarding the use of mobile phones The following table shows how the school considers the way these methods of communication should be used.
Staff & other adults Pupils
Communication Technologies Allo
wed
Allo
wed a
t cert
ain
tim
es
Allo
wed f
or
sele
cte
d
sta
ff
Not a
llow
ed
Allo
wed
Allo
wed a
t cert
ain
tim
es
Allo
wed w
ith s
taff
perm
issio
n
Not a
llow
ed
Mobile phones may be brought to school
Use of mobile phones in lessons
Use of mobile phones in social time
Taking photos on mobile phones or other camera devices
Use of personal devices
Use of personal email addresses in school, or on school network
Use of school email for personal emails
Use of chat rooms / facilities
Use of messaging apps
Use of social networking sites
Use of blogs
Use of Twitter
Use of video broadcasting eg Youtube
Assessment of risk Methods to identify, assess and minimise risks will be reviewed regularly. As technology advances the school will examine and adjust the e-safety Policy. Part of this consideration will include a risk assessment:
looking at the educational benefit of the technology considering whether the technology has access to inappropriate material
However, due to the global and connected nature of Internet content, it is not possible to guarantee that access to unsuitable material will never occur via a school computer. Neither the school nor Somerset County Council can accept liability for the material accessed, or any consequences resulting from Internet use.. All users need to be reminded that the use of computer systems, without permission or for inappropriate purposes, could constitute a criminal offence under the Computer Misuse Act 1990 and breaches will be reported to Police.
17
32
Reporting and Response to incidents The school will follow Somerset’s flowcharts to respond to illegal and inappropriate incidents as listed in those publications. More than one member of staff (at least one should be a senior leader) will be involved in this process and the same designated computer will be used for the duration of any investigation. All sites and content checked will be recorded and screen shots, signed and dated, will be kept where this is appropriate. Should content being reviewed include images of Child abuse then the monitoring will be halted and referred to the Police immediately. All members of the school community will be informed about the procedure for reporting e-safety
concerns (such as breaches of filtering, cyberbullying, illegal content) The e-safety Leader or Headteacher will record all reported incidents and actions taken in the
School e-safety incident log and in any other relevant areas e.g. Bullying or Child Protection log The designated Child Protection Coordinator will be informed of any e-safety incidents involving
child protection concerns, which will then be escalated in accordance with school procedures The school will manage e-safety incidents in accordance with the School Behaviour Policy where
appropriate The school will inform parents and carers of any incidents or concerns in accordance with school
procedures After any investigations are completed, the school will debrief, identify lessons learnt and
implement any changes required Where there is cause for concern or fear that illegal activity has taken place or is taking place then
the school will contact Somerset Children Safeguarding Team and escalate the concern to the police
If the school is unsure how to proceed with any incidents of concern, then the incident may be escalated to the Safeguarding for Schools Adviser, Local Authority Designated Officer (LADO) or Senior Education Technology Adviser If an incident or concern needs to be passed beyond the school then the concern will be escalated to the Safeguarding for Schools Adviser and eLIM 01823 356839 to communicate to other schools in Somerset. Should serious e-safety incidents take place, the following external persons and agencies should be informed:
Safeguarding for Schools Adviser Via Somerset Direct where pupil involved
Local Authority Designated Officer (LADO) Via Somerset Direct where staff involved
Police
Senior Education Technology Adviser Lucinda Searle 01823 356839
The police will be informed where users visit Internet sites, make, post, download, upload, data transfer, communicate or pass on, material, remarks, proposals or comments that contain or relate to:
child sexual abuse images promotion or conduct of illegal acts, under the child protection, obscenity, computer misuse and
fraud legislation adult material that potentially breaches the Obscene Publications Act in the UK criminally racist material, verbally abusive or threatening material information which is false and
known or believed by the sender to be false
Sanctions and Disciplinary proceedings Sanctions and disciplinary procedures may be taken where users visit Internet sites, make, post, download, upload, data transfer, communicate or pass on, material, remarks, proposals or comments that contain or relate to (unless this is part of an investigation (p 17):
Child Sexual abuse images Grooming, incitement, arrangement or facilitation of sexual acts against children Contrary
to the Sexual Offences Act 2003. pornography, adult or mature content promotion of any kind of discrimination, racial or religious hatred personal gambling or betting personal use of auction sites any site engaging in or encouraging illegal activity threatening behaviour, including promotion of physical violence or mental harm any other information which may be offensive to colleagues or breaches the integrity of
the ethos of the school or brings the school into disrepute
33
using school systems to run a private business use systems, applications, websites or other mechanisms that bypass
the filtering or other safeguards employed by the school uploading, downloading or transmitting commercial software or any copyrighted materials
belonging to third parties, without the necessary licensing permissions revealing or publicising confidential or proprietary information (e.g. financial or personal
information, databases, computer or network access codes and passwords) creating or propagating computer viruses or other harmful files carrying out sustained or instantaneous high volume network traffic (downloading or
uploading files) that causes network congestion and hinders others in their use of the Internet
In addition the following indicates school policy on these uses of the Internet:
Acceptable Acceptable at
certain times
Acceptable for
nominated users
Unacceptable
Online gaming (educational)
Online gaming (non-educational)
Online gambling
Online shopping / commerce
File sharing (using p2p networks)
Sanctions: Pupils The 2011 Education Act increased powers with regard to the searching for and of electronic devices and the deletion of data. These are applied through the school’s Behaviour Policy.
Incidents
Refe
r to
cla
ss t
eacher
/ tu
tor
Refe
r to
Headte
acher
Refe
r to
Polic
e
Refe
r to
technic
al support
sta
ff f
or
actio
n r
e f
ilterin
g / s
ecurity
etc
Info
rm p
are
nts
/ c
are
rs
Rem
oval of
netw
ork
/ I
nte
rnet access
rig
hts
Warn
ing
Fu
rther
sanctio
n e
g d
ete
ntio
n /
exclu
sio
n
Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable / inappropriate activities).
Unauthorised use of non-educational sites during lessons
Unauthorised use of mobile phone / digital camera / other handheld device
Unauthorised use of social networking / instant messaging / personal email
Unauthorised downloading or uploading of files
Attempting to access or accessing the school network, using another pupil’s account
Corrupting or destroying the data of other users
Continued infringements of the above, following previous warnings or sanctions
Accidentally accessing offensive material and failing to report the incident
34
Sanctions: Staff
Incidents:
Refe
r to
Head teacher
Refe
r to
Local A
uth
ority
/ H
R
Refe
r to
LA
DO
(L)/
Polic
e(P
)
Refe
r to
Te
chnic
al S
upport
Sta
ff f
or
actio
n r
e f
ilterin
g e
tc
Warn
ing
Dis
cip
linary
actio
n
Deliberately accessing or trying to access material that could be considered illegal (see list in earlier section on unsuitable / inappropriate activities).
L,P
Excessive or inappropriate personal use of the Internet / social networking sites / instant messaging / personal email
Unauthorised downloading or uploading of files
Allowing others to access school network by sharing username and passwords or attempting to access or accessing the school network, using another person’s account
Careless use of personal data e.g. holding or transferring data in an insecure manner
Deliberate actions to breach data protection or network security rules
Corrupting or destroying the data of other users or causing deliberate damage to hardware or software
Sending an email, text or instant message that is regarded as offensive, harassment or of a bullying nature staff
Sending an email, text or instant message that is regarded as offensive, harassment or of a bullying nature to learners L
Breech of the school e-safety policies in relation to communication with learners L
Using personal email / social networking / instant messaging / text messaging to carry out digital communications with pupils? L
Actions which could compromise the staff member’s professional standing
Actions which could bring the school into disrepute or breach the integrity of the ethos of the school
Using proxy sites or other means to subvert the school’s filtering system
Accidentally accessing offensive or pornographic material and failing to report the incident L
Deliberately accessing or trying to access offensive or pornographic material L
Breaching copyright or licensing regulations
Continued infringements of the above, following previous warnings or sanctions
35
Appendix 1
Timberscombe and Cutcombe
First Schools
Acceptable User Policies (October 2015)
Staff
Volunteer
Technician
Visitor
Occasional Visitor
36
Staff and Volunteer Acceptable Use Policy School Policy
This Acceptable Use Policy reflects the school e-safety policy.The school will ensure that staff
and volunteers will have good access to ICT to enable efficient and effective working, to enhance
learning opportunities for pupils and will, in return, expect staff and volunteers to agree to be
responsible users.
Scope of Policy
This Acceptable User Policy (AUP) applies to staff, volunteers and guests who have access to
school ICT systems and to school related use of ICT systems outside of school.
My Responsibilities
I agree to:
read, understand, sign and act in accordance with the School e-safety policy
report any suspected misuse or concerns to the e-safety Leader
monitor ICT activity in lessons, extracurricular and extended school activities
model the safe use of technology
demonstrate consistently high standards of personal and professional conduct
especially in relation to use of social networks making sure that these are in line with
school ethos and policies especially at the time of a Critical Incident Education I agree to:
provide appropriate e-safety learning opportunities as part of a progressive e-safety
curriculum
respect copyright and educate the pupils to respect it as well Training I agree to:
participate in e-safety training
request training if I spot an opportunity to improve on my professional abilities Cyberbullying I agree to:
ensure the schools zero tolerance of bullying. In this context cyberbullying is seen as
no different to other types of bullying.
report any incidents of bullying in accordance with school procedures Technical Infrastructure I understand that the school will monitor my use of computers and the internet. I will not try
to by-pass any of the technical security measures that have been put in place by the school. These
measures include:
the proxy or firewall settings of the school network (unless I have permission)
not having the rights to install software on a computer (unless I have permission)
not using removable media (unless I have permission)
Passwords
I will never log another user onto the system using my login
Filtering
I will not try to by-pass the filtering system used by the school
If I am granted special access to sites that are normally filtered I will not leave my
computer unsupervised
I will report any filtering issues immediately
37
Data Protection I understand my responsibilities towards the Data Protection Act and will
ensure the safe keeping of personal data at all times.
I will ensure that all data held in personal folders is regularly backed up.
Use of digital images
I will follow the school’s policy on using digital images especially in making sure that only
those pupils whose parental permission has been given are published. Communication I will be professional in all my communications and actions when using school ICT systems.
I will use the school provided email for all business matters.
I will not open any attachments to emails, unless the source is known and trusted (due to the
risk of the attachment containing viruses or other harmful programmes).
Social Media and Personal Publishing
I will ask permission before I use social media with pupils or for other school related work.
I will follow the e-safety policy concerning the personal use of social media.
On any personal accounts I will not post any comments about any pupil and not post
disparaging remarks about my employer/colleagues.
When there is a Critical Incident I will not post any comments online.
Mobile Phones
I will not use my personal mobile phone during contact time with pupils.
I will not use my personal mobile phone to contact pupils or parents.
Reporting incidents
I will report any incidents relating to e-safety to the e-safety Leader or Headteacher.
I will make a note of any incidents in accordance with school procedures.
I understand that in some cases the Police may need to be informed.
Sanctions and Disciplinary procedures
I understand that there are regulations in place when pupils use ICT and that there are
sanctions if they do not follow the rules.
I understand that if I misuse the School ICT systems in any way then there are disciplinary
procedures that will be followed by the school. I have read and understand the full School e-safety policy and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) in a responsible and professional manner as outlined in that document.
Staff/Volunteer Name ________________________________________________
Signed ____________________________________________________
Date ____________________________
38
Technician Acceptable Use Policy Extension
The school ICT Technician or person with administration rights is placed in an exceptional
position of trust. Many of the duties that the Headteacher expects these people to
complete could be against the Staff Acceptable User Policy of the school.
This document is not a job description but an addition to the Staff Acceptable User Policy
that allows the ICT technician to fulfil these duties. Schools should customise this document
to fit their needs.
Areas of concern are that:
Files may be created, imported or processed by staff and pupils and stored on the
school’s servers or other storage systems (e.g.USB memory sticks, SD cards etc.) that
might be of an inappropriate nature to the school setting. Inappropriate use includes
any production, processing or transmission of offensive, provocative, racist, unethical,
irreligious or anti-social materials in any format. Also included in this area are any
materials that are against the rules and conditions of service for the school e.g.
material that might bring the establishment into disrepute. Work created during the
school’s time or on the school’s equipment or on one’s own equipment but for school
work, belongs to the school.
User accounts will need to be created and serviced meaning that there may be access
to these accounts by the ICT technician.
Through work within the school’s administration network the ICT Technician may be
placed in the position of assisting in the processing of confidential information
including children’s health or MIS data, confidential letters or information from or to
senior staff, budgeting plans etc.
The ICT technicians through specific user names and password have control,
(sometimes through remote workstations) to the schools network. In the past there
have been examples where these powers have been abused.
Because of these areas of concern the ICT Technician should:
be responsible for monitoring the school’s network.
be given permission to access other user’s files.
protect the users by maintaining a filter for the school.
monitor the internet use of users within the school.
be aware of the laws relating to the use of computers especially those around Data
Protection, Copyright and those referred to in the school’s e-safety Policy and AUPs.
39
make sure that they record all user names and passwords for all
the services they access in a place where the senior leaders in the
school can access them.
have their use of the school’s network, internet and other aspects of their work open
for scrutiny.
To enable them to discharge these duties they should:
receive training on the sensitive nature of their job especially in relation to Data
Protection and the confidentiality of information.
have an agreed procedure for managing the internet filter. This should include a log
of decisions made.
have an agreed understanding of what is expected of them as far as the regular
monitoring of the network system and internet.
have agreed procedures for reporting incidents.
log any incidents including minor ones that are quickly resolved.
be careful to make sure that they are observed when investigating serious incidents to
make sure that they are protected against any allegations that could arise (e.g. never
open websites that are suspected of having inappropriate material unless others are
present).
have frequent meetings with their line manger to report on any issues or trends.
As an ICT Technician (or a person who has similar responsibilities) I have read the above
document and understand that I will be directed by senior staff to complete work outside of
the Staff Acceptable User Policy.
I will report all concerns I have to the appropriate member of Senior Management.
Name: __________________________________________________________
Signed: __________________________________________________________
Senior Member of Staff: ___________________________________________
Date: __________________
40
Visitor Acceptable Use Policy Visitors should apply certain standards when using computer equipment in schools.
These standards should include an awareness of Data Protection and Copyright laws.
Logging in
If you use the school’s equipment then request a guest log in.
If you are using equipment that has been logged in by a member of staff always ensure
a member of staff is present. Always lock the machine if they need to leave the room.
If your service contract (Network/MIS support) allows you access to the system
through team logins inform the school how you will be accessing the system.
Wireless Access
Request permission to use the wireless connection (if available) asking for an
authorisation key. You may need to change proxy settings.
Remember that bandwidth is limited so avoid intensive use such as large downloads.
Internet Access and uploading
The schools Internet connection is filtered so access might be denied to some sites.
Seek permission to access sites that are unavailable through the schools normal
filtering system. This might not be possible as changes to the filter can take some
time.
You are responsible for the sites that appear on any machine that you are using. Report
any issues with the member of staff present.
Never upload and install software or updates without permission from a member of
staff.
If you use your own equipment:
Make sure that it has up to date virus protection software installed.
That you take care with trailing wires.
That you can identify your equipment.
Never leave your equipment unattended or in an unlocked room.
Downloading files or documents
For all files
Make sure that the USB stick/external hard drive has recently been virus checked.
Never transfer files unless you have permission.
Make sure that you clearly state the purpose for transferring these files.
Check to see if the school machine you would like to transfer files from or to is
encrypted as it might automatically encrypt your USB stick/hard disc drive.
If the file contains sensitive personal data such as staff or student information
Get permission for this in writing or by email.
41
(Note: Where existing service contracts (Network/MIS support)
indicate that this type of work will take place permission will not be
needed).
Use an encrypted memory stick or hard drive.
Transfer the file only over a secure email connection.
If you take pictures, video or sound files then check
That you have permission to capture these files.
That the staff/children have all given their permission for these images/voices to be
used.
That if you intend to use these files in a public area (website, blog etc.) or for financial
gain that you request this permission in writing or through email.
Name: ______________________________________
Signed: ____________________________________
Date ______________________
42
Occasional Visitors e-safety agreement
Appendix 2 Pupil Acceptable Use Policy Examples (please note, these are screen shots of Communicate in Print Documents,
these are also available as PDF files)
On signing the visitors’ book you agree to:
only log onto the school network with the user name and password provided for you;
inform the Headteacher or their representative if you intend to use the Internet, asking permission before using any kind of social media with the children;
refrain from any use of your personal mobile phone or other device during the working day;
not taking any photographs;
report any suspected misuse or concerns about e-safety whether by pupils or staff, to the Headteacher or their representative before leaving the school;
not taking any information on pupils or staff off site unless specific permission has been given by the Headteacher or their representative;
not publishing any information online that may be offensive to staff or pupils, or may bring the school into disrepute.
43
44
45
Pupil Acceptable Use Policy
To help keep myself ‘e-safe’ at school I will do the following: 1. I will ask the teacher or assistant if I am unsure about anything
on the screen.
2. I will ask an adult if I am about to use the computer or internet. 3. I will not use my personal details on the computer. 4. I will not use chat rooms. 5. I will only use websites and search engines that I have been
advised to use. 6. I will turn off the screen and then tell a teacher if any pictures
or words come on to the screen that make me feel uncomfortable.
Signed: __________________________ Date: ____________________________
46
Appendix B: Guidance on the use of technology for communications between staff and learners 1. Introduction
1.1. Communication between children learners and adult staff should always take place within clear and explicit professional boundaries. This includes all communication using technology, including mobile phones, text messaging, emails, digital cameras, videos, web-cams, websites and blogs.
1.2. This guidance specifies acceptable and permissible modes of communication. 2. Scope of Guidance
2.1. This guidance is written for Educational establishments in Somerset, including Schools and FE Colleges.
2.2. This guidance covers use of technology for communication. 2.3. In addition to this guidance, Schools are encouraged to have the following policies:
2.3.1. E-safety policy – this policy should cover use of ICT, particularly the Internet, by staff and learners.
2.3.2. Acceptable Use policy, ensuring staff and volunteers are responsible ICT users. 3. Contact Details
3.1. Staff should not give their personal contact details to learners, including their personal mobile telephone number or home email address, unless the need to do so is agreed with senior management and parents/carers.
4. Methods of Contacting Learners
4.1. Staff should only use equipment provided by their organisation to communicate with children, e.g. work mobile phones, work email address.
4.2. Schools should consider including in their home/school agreements, permission to use these forms of communication with learners
4.3. Staff should not use social networking sites (e.g. Facebook) to communicate with learners, or others with whom they are in a position of trust.
4.4. It is not appropriate for staff , using any form of technology, to “friend” learners or add them to their contact lists; this may give the learners access to personal information and allow them to contact staff members inappropriately. It may also give access to staff members personal information and activities.”
5. Content of communication
5.1. When staff are in a position of trust, they should only make contact with learners for professional reasons and in accordance with any organisation policy.
5.2. As with any other communication between staff and learners : 5.2.1. The onus is on the adult and not learner to distance themselves from any
potentially inappropriate situation. 5.2.2. Emails or text messages of an inappropriate or personal nature should not be
sent. 5.2.3. An appropriate balance of formality and informality must be maintained at all
times. 5.2.4. All staff should consider that high volume of communication could be interpreted
as harassment.
47
5.2.5. Sexual remarks towards a learner are inappropriate regardless of their age or apparent consent.
5.2.6. Staff’s personal and private relationships should not be discussed with pupils. 6. References: South West Grid for Learning www.swgfl.org.uk/safe Guidance for Safer Working Practice for Adults who work with Children and Young People in Education Settings (DCSF - Dec 2008) Code of Professional Conduct for Teachers – GTC for England www.gtce.org.uk/documents/publicationpdfs/conduct_code_pccpt1007.pdf Code of Professional Conduct for Teachers – GTC for Scotland www.gtcs.org.uk/nmsruntime/saveasdialog.aspx?lID=3386&sID=4912 National Union of Teachers Code of Conduct www.suffolknut.org.uk/conduct.htm Cyberbullying: Supporting School Staff http://publications.teachernet.gov.uk/eOrderingDownload/cyberbullying-staff.pdf
Child Protection and Safeguarding Policy June 2016 Page 48 of 48
Online Safety Flowchart