esafety

50
eSAFETY Jenni Spencer Children’s safeguarding quality assurance unit CSF

Upload: dallon

Post on 06-Jan-2016

32 views

Category:

Documents


2 download

DESCRIPTION

eSAFETY. Jenni Spencer Children’s safeguarding quality assurance unit CSF. Children are ‘digital natives’ Exposed to ICT at an ever younger age. ICT is embedded in reception classrooms and is a constant feature of school life. ‘DIGITAL NATIVES’. INTERNET ACCESS. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: eSAFETY

eSAFETYJenni SpencerChildren’s safeguarding

quality assurance unit

CSF

Page 2: eSAFETY

‘DIGITAL NATIVES’

Children are ‘digital natives’

Exposed to ICT at an ever younger age.

ICT is embedded in reception classrooms and is a constant feature of school life

Page 3: eSAFETY

INTERNET ACCESS

Internet access and technology is becoming cheaper and CYP have increased access to internet

CYP spending increasing amounts of time online and sharing an ever widening range of images and personal information

Children are moving away from traditional media

Page 4: eSAFETY

4

THE INTERNET IS GOOD!

The internet provides children with; Excellent opportunities for learning Access to a wealth of informationThe opportunity to socialise and communicate

with friends and improve their confidenceThe ability to develop hobbies and interests The chance to play games, listen to music,

watch videos and have fun!

Page 5: eSAFETY

5

Search engines

Homework

Projects

Personal interest

Amazing facts

The biggest library in the world

Blogs (web log)

Vlogs (video log)

Websites

Text & pictures

Music/photo/video

Anyone can become a publisher

Socialise CreateLearning

Email/chat

VoIP - Skype

Instant Messenger

Multi-user games

Social networks

Brings people together

Page 6: eSAFETY

CYP use of internet

CYP increasingly communicate via;

Mobile phone text messaging

VoIP/SkypeGames consoles

offering internet and WiFi connections

Page 7: eSAFETY

7

IM chat rooms( MSN)Web logsImage and video

sharing sites (Flickr, You Tube)

Social networking sites (Bebo, MySpace, Facebook)

Page 8: eSAFETY

8

Different usageYOUNG PEOPLE

Interactive chat, IM, Music, Games, Blog

ADULTS

Mostly email & web for research

Page 9: eSAFETY

9

Adults often have anxieties about new media…

Everything that’s already in the world when you’re born is just normal;

Page 10: eSAFETY

10

“Anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it …until it’s been around for about ten years when it gradually turns out to be alright really.”

Douglas Adams

Page 11: eSAFETY

Emerging issues

Wifi- internet can be accessed wirelesslyTechnologies are converging- gaming

consoles (PSP, Nintendo, X box, DS) and mobile phones have broadband access.

Gaming sites, instant messaging sites (IM) and photo sharing technologies are merging and becoming components of larger social networking sites (SNS) which also contain personal profiles

Page 12: eSAFETY

WHAT ARE THE RISKS?

Page 13: eSAFETY

13

http://www.youtube.com/watch?v=-IOOn2wR8bU

Where’s Klaus?

13

Page 14: eSAFETY

CONTENT

Exposure to inappropriate content e.g. content that is pornographic, hateful, violent, encourages activities that are dangerous or illegal or just age inappropriate

Extreme material Unsolicited receipt by CYP of emails containing links to pornography/child abuse images

Inaccurate content- YP unable to discernCreated Content- YP publish personal info

Page 15: eSAFETY

15

Page 16: eSAFETY

COMMERCE

Blur between content & advertising Junk or scam emails from unscrupulous

tradersInvasive programmes - adware/popupsCYP give out financial details including

credit card details of parentsChildren registering with gambling

websites

Page 17: eSAFETY

17

Page 18: eSAFETY

18

BBC NEWS - Boy, Three, Buys Car on Internet

Jack here bought a pink Nissan on an internet auction site

“A three-year-old boy has used his mother's computer to buy a £9,000 car on an internet auction site”

Jack’s parents only discovered their son's successful bid when they received a message from eBay about the Barbie pink Nissan Figaro.

Rachael Neal, 36, said her son:

“was quite good at using the computer”

Page 19: eSAFETY

CONTACT

Predatory adults (often posing as children) use discussion forums, chat rooms and social networking sites to make contact with and groom children to sexually exploit them

CYP encouraged to perform sexual acts via webcam or to witness an adult exposing themselves

Cyber bullying via mobile phone text, chat rooms, social networking sites

Page 20: eSAFETY

CULTURE

Young people may become involved in inappropriate or antisocial behaviour while using new technologies

CYP not just recipients of downloaded content but are active participants uploading content to a worldwide audience

Web 2.0 environments – young people publish detailed accounts of their personal lives, contact info, photos and videos oblivious to possible implications and the permanence of their profiles

Page 21: eSAFETY

21

Changing environments

Downloading + Uploading

Consuming + Creating

Corporate + Personal

Separate media + Converged media

Static + Truly interactive

WEB v 1.0 WEB v 2.0

Page 22: eSAFETY

22

Page 23: eSAFETY

CEOP Strategic Overview 2008/9

Child exploitation and online protection centre (CEOP)-part of UK police,

Majority of children’s reports concern online grooming (89%)

Contact abuse (3%) Image distribution (2%) Increasing numbers children report being asked to

perform sexual acts on line via webcam Increase in number of abusive images online particularly

abuse images of babies and very young children Increase in violent and sadistic images Increasing level of threatening behaviour used as part of

grooming techniques

Page 24: eSAFETY
Page 25: eSAFETY

25

Page 26: eSAFETY

26

BBC News - Man Jailed After Grooming Girls

Police found Etheridge, a carpenter, had more than 200 indecent images of girls, aged 13 to 15, on his mobile phone and thousands more on his computer.

The court was told Etheridge offered mobile phone top-up vouchers to girls in return for them sending indecent images of themselves in messages.

Most worrying of all, he escalated from downloading internet images,

to grooming girls to make their own photos and actually meeting a girl to carry out sexual acts.

Page 27: eSAFETY

Emerging risks

Wifi-taking advantage of another persons (unsecured) wireless broadband connection to commit grooming and image offences

Integration of GPS technology into most new mobile phone models enables offenders to locate and track movements of CYP

Hacking plus Blackmail is emerging as a notable feature of grooming- offender hacks into YP’s social network homepage and sexualises existing photos and uses to blackmail YP to coerce them into interacting on webcam or meeting offline

Use of P2P platforms to send, share and order indecent images Cyberbullying- YP create an online profile using details of a pupil

or acquaintance and expose them to risk by inviting contact from unknown persons or even suspect online contacts (‘Pass the Pervert’)

Page 28: eSAFETY

28

How do we make children resilient?

Page 29: eSAFETY

29

Promote the positive/respond to the negative

Don’t be risk averseKnowledge v WisdomResilience to risks and knowledge of how

to deal with them

Page 30: eSAFETY

30

How to stay safe online Top tips for children

If anything online makes you feel scared or uncomfortable tell your carer

Only talk to people you know online Make sure you keep your personal details

privateSet your privacy levels to ‘Friends Only’Do not send nasty messages or bully other

people online

30

Page 31: eSAFETY

31

If you get a nasty message or get sent anything that makes you feel uncomfortable, do not reply. Show it to your carer

Do not meet up with friends you have met onlineDo not let others know your online passwordThink carefully about what you say or publish

online

Page 32: eSAFETY

32

Never open an attachment unless it is from someone you know

Reject Bluetooth messages/pairing requests from unknown users/leave Bluetooth in undiscoverable mode

Use the Report Abuse button to report things that concern you

Page 33: eSAFETY

33

Page 34: eSAFETY

34

Page 35: eSAFETY

35

Page 36: eSAFETY

36

Page 37: eSAFETY

37

Page 38: eSAFETY

38

Managing e safety in schools

Page 39: eSAFETY

39

Part of Staying Safe outcome of ECMCSCB has an e safety sub groupe safety policy- part of school

safeguarding packe safety contact officer- needs to be one

in every schoole safety incident report form- to report all

incidents concerning e safety to CSCB

Page 40: eSAFETY

40

School e safety policy

Page 41: eSAFETY

41

E Safety Contact Officer- role and responsibility

e safety awareness is raised and maintained within their school through dissemination/display of publicity material for children, parents and staff

All staff in school are aware of the e safety policy and procedure and that it is implemented and reviewed and updated on a regular basis

• All staff know how to access e safety training and that sufficient numbers of staff attend

• An e safety education is provided/signposted for children

• e safety is promoted to parents and carers

Page 42: eSAFETY

42

• Pupils are clear about who they should report e safety concerns to within the setting

• e safety incidents are responded to in an appropriate manner with appropriate action taken according to procedure

• e safety issues are monitored and reported to management and other agencies where appropriate

• a log of all e safety incidents is kept • support, information and advice is provided to

staff and children within the setting

Page 43: eSAFETY

43

E-SAFETY INCIDENT REPORT FORM Description of incident□ bullying or harassment (cyber bullying □ deliberately bypassing security or access□ hacking or virus propagation □ racist, sexist, homophobic religious hate material□ terrorist material □ drug/bomb making material□ child abuse images□ on-line gambling□ soft core pornographic material□ illegal hard core pornographic material□ other (please specify)

Page 44: eSAFETY

44

Nature of incident

Deliberate access/Accidental accessDid the incident involve material being;

□ created □ viewed □ printed □ shown to others

□ transmitted to others □ distributed

Could the incident be considered as;

□ harassment □ grooming□ cyber bullying □ breach of AUP

Page 45: eSAFETY

45

Action taken

Child/young person/ Staff□ incident reported to head teacher/senior manager□ advice sought from Safeguarding and Social Care□ referral made to Safeguarding and Social Care□ incident reported to police□ incident reported to social networking site□ incident reported to IT□ child’s parents informed□ disciplinary action to be taken□ child/young person debriefed□ e-safety policy to be reviewed/amended

Page 46: eSAFETY

46

Resources for schools

Page 47: eSAFETY

47

Page 48: eSAFETY

48

Page 49: eSAFETY
Page 50: eSAFETY

www.thinkuknow.co.uk