esafety
DESCRIPTION
eSAFETY. Jenni Spencer Children’s safeguarding quality assurance unit CSF. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life. ‘DIGITAL NATIVES’. INTERNET ACCESS. - PowerPoint PPT PresentationTRANSCRIPT
eSAFETYJenni SpencerChildren’s safeguarding
quality assurance unit
CSF
‘DIGITAL NATIVES’
Children are ‘digital natives’
Exposed to ICT at an ever younger age.
ICT is embedded in reception classrooms and is a constant feature of school life
INTERNET ACCESS
Internet access and technology is becoming cheaper and CYP have increased access to internet
CYP spending increasing amounts of time online and sharing an ever widening range of images and personal information
Children are moving away from traditional media
4
THE INTERNET IS GOOD!
The internet provides children with; Excellent opportunities for learning Access to a wealth of informationThe opportunity to socialise and communicate
with friends and improve their confidenceThe ability to develop hobbies and interests The chance to play games, listen to music,
watch videos and have fun!
5
Search engines
Homework
Projects
Personal interest
Amazing facts
The biggest library in the world
Blogs (web log)
Vlogs (video log)
Websites
Text & pictures
Music/photo/video
Anyone can become a publisher
Socialise CreateLearning
Email/chat
VoIP - Skype
Instant Messenger
Multi-user games
Social networks
Brings people together
CYP use of internet
CYP increasingly communicate via;
Mobile phone text messaging
VoIP/SkypeGames consoles
offering internet and WiFi connections
7
IM chat rooms( MSN)Web logsImage and video
sharing sites (Flickr, You Tube)
Social networking sites (Bebo, MySpace, Facebook)
8
Different usageYOUNG PEOPLE
Interactive chat, IM, Music, Games, Blog
ADULTS
Mostly email & web for research
9
Adults often have anxieties about new media…
Everything that’s already in the world when you’re born is just normal;
10
“Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it …until it’s been around for about ten years when it gradually turns out to be alright really.”
Douglas Adams
Emerging issues
Wifi- internet can be accessed wirelesslyTechnologies are converging- gaming
consoles (PSP, Nintendo, X box, DS) and mobile phones have broadband access.
Gaming sites, instant messaging sites (IM) and photo sharing technologies are merging and becoming components of larger social networking sites (SNS) which also contain personal profiles
WHAT ARE THE RISKS?
13
http://www.youtube.com/watch?v=-IOOn2wR8bU
Where’s Klaus?
13
CONTENT
Exposure to inappropriate content e.g. content that is pornographic, hateful, violent, encourages activities that are dangerous or illegal or just age inappropriate
Extreme material Unsolicited receipt by CYP of emails containing links to pornography/child abuse images
Inaccurate content- YP unable to discernCreated Content- YP publish personal info
15
COMMERCE
Blur between content & advertising Junk or scam emails from unscrupulous
tradersInvasive programmes - adware/popupsCYP give out financial details including
credit card details of parentsChildren registering with gambling
websites
17
18
BBC NEWS - Boy, Three, Buys Car on Internet
Jack here bought a pink Nissan on an internet auction site
“A three-year-old boy has used his mother's computer to buy a £9,000 car on an internet auction site”
Jack’s parents only discovered their son's successful bid when they received a message from eBay about the Barbie pink Nissan Figaro.
Rachael Neal, 36, said her son:
“was quite good at using the computer”
CONTACT
Predatory adults (often posing as children) use discussion forums, chat rooms and social networking sites to make contact with and groom children to sexually exploit them
CYP encouraged to perform sexual acts via webcam or to witness an adult exposing themselves
Cyber bullying via mobile phone text, chat rooms, social networking sites
CULTURE
Young people may become involved in inappropriate or antisocial behaviour while using new technologies
CYP not just recipients of downloaded content but are active participants uploading content to a worldwide audience
Web 2.0 environments – young people publish detailed accounts of their personal lives, contact info, photos and videos oblivious to possible implications and the permanence of their profiles
21
Changing environments
Downloading + Uploading
Consuming + Creating
Corporate + Personal
Separate media + Converged media
Static + Truly interactive
WEB v 1.0 WEB v 2.0
22
CEOP Strategic Overview 2008/9
Child exploitation and online protection centre (CEOP)-part of UK police,
Majority of children’s reports concern online grooming (89%)
Contact abuse (3%) Image distribution (2%) Increasing numbers children report being asked to
perform sexual acts on line via webcam Increase in number of abusive images online particularly
abuse images of babies and very young children Increase in violent and sadistic images Increasing level of threatening behaviour used as part of
grooming techniques
25
26
BBC News - Man Jailed After Grooming Girls
Police found Etheridge, a carpenter, had more than 200 indecent images of girls, aged 13 to 15, on his mobile phone and thousands more on his computer.
The court was told Etheridge offered mobile phone top-up vouchers to girls in return for them sending indecent images of themselves in messages.
Most worrying of all, he escalated from downloading internet images,
to grooming girls to make their own photos and actually meeting a girl to carry out sexual acts.
Emerging risks
Wifi-taking advantage of another persons (unsecured) wireless broadband connection to commit grooming and image offences
Integration of GPS technology into most new mobile phone models enables offenders to locate and track movements of CYP
Hacking plus Blackmail is emerging as a notable feature of grooming- offender hacks into YP’s social network homepage and sexualises existing photos and uses to blackmail YP to coerce them into interacting on webcam or meeting offline
Use of P2P platforms to send, share and order indecent images Cyberbullying- YP create an online profile using details of a pupil
or acquaintance and expose them to risk by inviting contact from unknown persons or even suspect online contacts (‘Pass the Pervert’)
28
How do we make children resilient?
29
Promote the positive/respond to the negative
Don’t be risk averseKnowledge v WisdomResilience to risks and knowledge of how
to deal with them
30
How to stay safe online Top tips for children
If anything online makes you feel scared or uncomfortable tell your carer
Only talk to people you know online Make sure you keep your personal details
privateSet your privacy levels to ‘Friends Only’Do not send nasty messages or bully other
people online
30
31
If you get a nasty message or get sent anything that makes you feel uncomfortable, do not reply. Show it to your carer
Do not meet up with friends you have met onlineDo not let others know your online passwordThink carefully about what you say or publish
online
32
Never open an attachment unless it is from someone you know
Reject Bluetooth messages/pairing requests from unknown users/leave Bluetooth in undiscoverable mode
Use the Report Abuse button to report things that concern you
33
34
35
36
37
38
Managing e safety in schools
39
Part of Staying Safe outcome of ECMCSCB has an e safety sub groupe safety policy- part of school
safeguarding packe safety contact officer- needs to be one
in every schoole safety incident report form- to report all
incidents concerning e safety to CSCB
40
School e safety policy
41
E Safety Contact Officer- role and responsibility
e safety awareness is raised and maintained within their school through dissemination/display of publicity material for children, parents and staff
All staff in school are aware of the e safety policy and procedure and that it is implemented and reviewed and updated on a regular basis
• All staff know how to access e safety training and that sufficient numbers of staff attend
• An e safety education is provided/signposted for children
• e safety is promoted to parents and carers
42
• Pupils are clear about who they should report e safety concerns to within the setting
• e safety incidents are responded to in an appropriate manner with appropriate action taken according to procedure
• e safety issues are monitored and reported to management and other agencies where appropriate
• a log of all e safety incidents is kept • support, information and advice is provided to
staff and children within the setting
43
E-SAFETY INCIDENT REPORT FORM Description of incident□ bullying or harassment (cyber bullying □ deliberately bypassing security or access□ hacking or virus propagation □ racist, sexist, homophobic religious hate material□ terrorist material □ drug/bomb making material□ child abuse images□ on-line gambling□ soft core pornographic material□ illegal hard core pornographic material□ other (please specify)
44
Nature of incident
Deliberate access/Accidental accessDid the incident involve material being;
□ created □ viewed □ printed □ shown to others
□ transmitted to others □ distributed
Could the incident be considered as;
□ harassment □ grooming□ cyber bullying □ breach of AUP
45
Action taken
Child/young person/ Staff□ incident reported to head teacher/senior manager□ advice sought from Safeguarding and Social Care□ referral made to Safeguarding and Social Care□ incident reported to police□ incident reported to social networking site□ incident reported to IT□ child’s parents informed□ disciplinary action to be taken□ child/young person debriefed□ e-safety policy to be reviewed/amended
46
Resources for schools
47
48
www.thinkuknow.co.uk