The South Yorkshire County Trading Administration Safety Project

Size: px
Start display at page:

Download "The South Yorkshire County Trading Administration Safety Project"

Transcription

1 1 Purpose 1.1 The purpose of this procedure is to outline how settings where children and young people have access to the internet and other forms of technology should respond when there are breaches of esafety Policies including the Information Security and Computer Usage Policy and Protocols, and the ebehaviour Agreements, and where inappropriate materials are accessed. 2 Scope 2.1 This policy applies to staff, volunteers and young people in any settings who may have breached esafety Policies. 2.2 The policy also applies to a number of settings including schools, residential homes, libraries and other settings where young people have access to the Internet and other digital technologies. 3 References 3.1 The BECTA FITS framework and ITIL Incident Management process guidance has been consulted. 4 Definitions 4.1 Line : the most senior person in the agency responsible for safeguarding issues. Action to be taken when the breach is made by a member of staff Person Responsible

2 5.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been accessed the person who is made aware of this will report this to the agencies designated lead for esafety/safe guarding 5.2 The designated lead in the agency will conduct an initial fact finding investigation which will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 5.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 5.4 The head teacher/line manager will have been informed and should be given the results of the initial fact finding investigation 5.5 The head teacher/line manager will discuss the concerns with the Local Authority Designated Officer (LADO) in order to discuss whether there is a need for a Strategy Meeting. During this discussion consideration will be given as to whether the police need to be involved. The head teacher/line manager will also discuss with their HR advisers if the member of staff needs to be suspended or undertake different duties pending the completion of the enquiries. 5.6 The line manager/head teacher will also discuss the incident with the esafety lead in the Local Authority as consideration will need to be given to any further actions required. 5.7 Discussions will also need to take place between the local authority esafety lead and Strategic ICT lead to agree if the site(s) are blocked for the duration of the investigations. 5.8 The strategy meeting process will be completed following the South Yorkshire Child Protection Appendix 4 Allegations Against Staff Protocol Member of Staff aware of the incident esafety Lead 5.9 The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Action to be taken when a young person has been accessing inappropriate sites 6.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been access the person who is made aware of this will report this to the agencies designated lead for esafety/child protection 6.2 The designated lead in the agency will conduct an initial fact finding investigation who will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 6.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 6.4 The head teacher/line manager will have been informed and should then be given the results of the initial fact finding investigation Person Responsible Member of Staff aware of the incident Teacher/

3 6.5 The head teacher/line manager will discuss the concerns with the manager of the Assessment Team in their area to establish if there are child protection concerns requiring a Section 47 Child Protection investigation. If this is required the Assessment Team will conduct this investigation as required within the South Yorkshire Child Protection Procedures 6.6 If there is no child protection investigation a decision will be made between the head teacher/line manager and the duty social worker as to whether additional work will be completed with the young person and their family via an Initial Assessment or the Common Assessment Framework. This process will ensure that parents are fully aware of the concerns/incidents and they will be given advice and information about managing the internet, use of parental controls etc. 6.7 At the time that the incident is reported the computer/laptop will be removed. The esafety lead in the agency will ask BULL IT / the brokered IT supplier to investigate what has been accessed on the hard drive and will be asked to complete a report detailing the usage. This report will be made available to the agency, Strategic ICT and the lead for esafety in the authority. This report will be required to inform the investigations. Assistant Team Assessment Team esafety Lead/BULL IT/Brokered IT Supplier 6.8 The management of esafety within the agency will also need to be considered including any recommendations for additional training 6.9 After the completion of all investigations the head teacher/line manager will need to provide a report to the Local Authority lead/strategic ICT to outline the outcome of the work undertaken, updated risk assessments relating to the management of access to computers any identified training needs Discussions will take place based on the information available to decide whether it is appropriate for the site(s) to be unblocked and Strategic ICT will arrange the unblocking of the site and the notification to the agency/other agencies who also need access to the site The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Strategic ICT esafety lead

4 Appendix 1: Flow chart showing the processes to be followed when breach of esafety Policy is made by a member of staff: Breach of esafety Policies Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Member of Staff accessing inappropriate sites Inform head teacher/line manager teacher/line manager discusses with LADO HR Police Discussion esafety lead LA blocking of site Strategy Meeting Needed Able to Continue in Employment Criminal Matter Yes/No esafety lead discusses with SICT lead Strategy Meeting Site Blocked Pending Completion of Investigation No further action teacher/line manager discuss with member of staff e-safety breach, ensure any training offered refresh of policies and procedures by member of staff Breach of the policy confirmed Police Involvement Discussion with e-safety leads re. unblocking of the site subject to internal actions completed Appendix 2: Suspension management investigation by employer Breach of esafety AUP Complete incident log & send to LA

5 Flow chart showing the processes to be followed when breach of esafety Policy is made by a young person: Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Young Person Inform head teacher/line manager Discussion with Assessment Team Discussion esafety lead in LA re. blocking of site S47 Investigation No S47 esafety lead discusses with SICT lead No Further Action Discuss and agree if work undertaken via CAF/Initial Assessment Site Blocked Pending Completion of Investigation Child Protection Conference Child Protection Plan for Child Agree with agency any additional work Complete incident log & send to LA

RIPA (Regulations and Investigatory Powers Act)

RIPA (Regulations and Investigatory Powers Act) Dartmoor National Park Authority INTERNET MONITORING POLICY & INVESTIGATION PROTOCOL Approved: February 2010 Review Date: September 2010 1. Introduction Private use of the computer facilities is covered

More information

U 16 Internet Monitoring Policy & Investigation Protocol

U 16 Internet Monitoring Policy & Investigation Protocol Dartmoor National Park Authority U 16 Internet Monitoring Policy & Investigation Protocol February 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted

More information

How To Deal With Abuse In A School

How To Deal With Abuse In A School Guidance for schools on dealing with Allegations of abuse against Staff and Volunteers Guidance for schools on dealing with Allegations of abuse against Staff and Volunteers 2 CONTENTS 1. Introduction

More information

How To Deal With An Allegation Of Sexual Abuse In A School

How To Deal With An Allegation Of Sexual Abuse In A School 1 Model Allegations Management Policy for Knowsley Schools and Education Settings July 2015 Introduction 1. All schools and education settings have a duty to promote and safeguard the welfare of children

More information

Model procedure for schools responding to allegations of abuse by teachers and other school staff. September 2011 Schools HR Consultancy

Model procedure for schools responding to allegations of abuse by teachers and other school staff. September 2011 Schools HR Consultancy Model procedure for schools responding to allegations of abuse by teachers and other school staff Summary September 2011 Schools HR Consultancy The Department of Education has produced statutory guidance

More information

NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES

NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES Disciplinary Procedure 1 1.1 Introduction This procedure provides guidance on disciplinary issues. The procedure is endorsed by the National Joint

More information

Responding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club

Responding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club Responding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club Across cricket, at all levels, there is a requirement to have clear and unambiguous procedures in place in respect

More information

Berwick Academy Policy on E Safety

Berwick Academy Policy on E Safety Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Witton Middle School

Witton Middle School Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton

More information

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School: Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership

More information

St Vincent s Catholic Primary School e-safety Policy

St Vincent s Catholic Primary School e-safety Policy St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety

More information

John of Rolleston Primary School

John of Rolleston Primary School John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership

More information

This procedure applies where formal disciplinary action is commenced on or after 11 December 2013

This procedure applies where formal disciplinary action is commenced on or after 11 December 2013 Appendix X Disciplinary Procedure This procedure applies where formal disciplinary action is commenced on or after 11 December 2013 1 Purpose 1.1 This procedure is designed to help and encourage all employees

More information

Employment Policies, Procedures & Guidelines for Schools

Employment Policies, Procedures & Guidelines for Schools DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES July 2014 1 ABOUT THIS GUIDANCE This is statutory

More information

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including

More information

E-Safety Policy and Regulations at School

E-Safety Policy and Regulations at School Chailey School - E-Safety Policy WHAT IS E-SAFETY? Chailey School sees the area of E-Safety as a child protection issue and not one that is solely evident in ICT. All staff and students have a duty to

More information

Employment Policies, Procedures & Guidelines for Schools

Employment Policies, Procedures & Guidelines for Schools DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES March 2012 1 ABOUT THIS GUIDANCE This is

More information

E- Safety and Digital Photography - College ICT

E- Safety and Digital Photography - College ICT Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,

More information

Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors

Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Policy Nr 109 Published 30-Jun-15 Page 1 of 5 Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors School Guidelines

More information

Oratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY

Oratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY Oratory R.C. Primary and Nursery School Shine as to be a light to others E-SAFETY POLICY Reviewed by Safeguarding, Health and Safety and Premises Committee: 1.10.14 Approved by the Governing Body: 15.10.14

More information

Records Retention and Disposal Schedule. Information Management

Records Retention and Disposal Schedule. Information Management Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,

More information

Safeguarding children online

Safeguarding children online Schools January 2008 Safeguarding children online A guide for school leaders www.becta.org.uk/schools/safety Using technology safely Safeguarding children online 01 In the physical world it s relatively

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

E-Safety Policy. Please read this policy in conjunction with the policies listed below:

E-Safety Policy. Please read this policy in conjunction with the policies listed below: E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection

More information

King David Primary School Staff Social Networking Policy

King David Primary School Staff Social Networking Policy King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada. TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following

More information

SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL

SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING

More information

P319 Internet (including social networking) and email usage in schools and academies Model policy

P319 Internet (including social networking) and email usage in schools and academies Model policy Contents (If you are viewing this document online, click on the headings below to jump to the relevant section) 1. Introduction... 1 2. Internet use... 2 3. Email use... 2 4. Data protection, freedom of

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

GREAT WALTHAM C of E PRIMARY SCHOOL

GREAT WALTHAM C of E PRIMARY SCHOOL GREAT WALTHAM C of E PRIMARY SCHOOL CHILD PROTECTION POLICY JULY 2015 Approved by Staff July 2015 Adopted by Governors of the FGB Committee July 2015 Recommended Review Date July 2016 1 KEY CONTACTS WITHIN

More information

St Bernadette s Catholic Primary School. E-Safety Policy

St Bernadette s Catholic Primary School. E-Safety Policy St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational

More information

School Child Protection & Safeguarding Policy 2014/2015

School Child Protection & Safeguarding Policy 2014/2015 School Child Protection & Safeguarding Policy 2014/2015 Abbey Park Primary Academy Child Protection & Safeguarding Policy 2014/2015 The Acting Principal is Emme Ford This policy was developed on the 10

More information

Roskear Primary & Nursery School. E-Safety Policy

Roskear Primary & Nursery School. E-Safety Policy E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed

More information

Acceptable Use of Internet and Digital Technology

Acceptable Use of Internet and Digital Technology Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use

More information

360 Degree Safe Cymru SELF REVIEW TOOL

360 Degree Safe Cymru SELF REVIEW TOOL 360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk

More information

E-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1

E-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1 The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,

More information

Dealing with Allegations of Abuse Against Staff in Schools. Practice Guidance

Dealing with Allegations of Abuse Against Staff in Schools. Practice Guidance Dealing with Allegations of Abuse Against Staff in Schools Practice Guidance About this guidance This is statutory guidance from the Department for Education. Schools and colleges must have regard to it

More information

School Discipline - Standard of Procedure

School Discipline - Standard of Procedure STAFF DISCIPLINARY PROCEDURE Current document may be accessed under the policies tab at: www.warblington.hants.sch.uk Document Control Baseline Document Comments/ Scheduled Review Date Action/ Reviewed

More information

DISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF

DISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF DISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF Based on Leeds City Council recommendations January 2012 1 CONTENTS 1. Introduction 2. Scope of the Procedure 3. Core Principles 4. Management of

More information

Data Breach Management Policy and Procedures for Education and Training Boards

Data Breach Management Policy and Procedures for Education and Training Boards Data Breach Management Policy and Procedures for Education and Training Boards POLICY on DATA BREACHES in SCHOOLS/COLLEGES and OTHER EDUCATION and ADMINISTRATIVE CENTRES UNDER the REMIT of TIPPERARY EDUCATION

More information

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner 4. Date created February 2015 5. Date of

More information

St Edward s Church of England Academy. E-Safety Policy

St Edward s Church of England Academy. E-Safety Policy St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

Information governance guidance for schools

Information governance guidance for schools Information governance guidance for schools Guidance Guidance document no: 186/2015 Date of issue: September 2015 Information governance guidance for schools Audience All staff, governors and learners

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

POLICIES AND PROCEDURES DISCIPLINARY POLICY

POLICIES AND PROCEDURES DISCIPLINARY POLICY POLICIES AND PROCEDURES DISCIPLINARY POLICY Date Approved Version Issue Date Review Lead Person by Trust Board Date 27 Sept 2011 Three 01/10/2011 30/09/13 Head of Personnel Procedure/Policy Number PP08

More information

Wilsthorpe Community School

Wilsthorpe Community School Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed

More information

E-Safety Policy Last reviewed 2012 Updated October 2014

E-Safety Policy Last reviewed 2012 Updated October 2014 E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Staff Investigation Protocol

Staff Investigation Protocol Version: 3.0 Document author(s): Stuart Selkirk Approved by: Executive Partnership Forum Date approved: 17 July 2014 Review date: 30 September 2016 Document scope: Trust-wide Version History Log Use this

More information

Access Control and Account Management Policy Version 1.8 9 May 2015

Access Control and Account Management Policy Version 1.8 9 May 2015 Information Security Management Access Control and Account Management Policy Version 1.8 9 May 2015 University of Leeds 2015 The intellectual property contained within this publication is the property

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER

ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER We want you to feel safe all the time. Make sure you: o always keep your passwords a secret o only open pages which your teacher has said are OK o only

More information

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy

Protocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol

More information

How To Get A Credit Card From Dsostingprotection

How To Get A Credit Card From Dsostingprotection Terms of Service IMPORTANT NOTICE: *All Payments To DDoshostingprotection Are Non-Refundable* "DDoshostingprotection") agrees to furnish services to the Subscriber, subject to the following TOS (Terms

More information

PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013

PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013 1.0 Summary of Changes Amendments to the 1 st bullet point of section 4.5 and the 3 rd, 4 th, 6 th and 7 th bullet point in section 4.8 have been made. Section 4.9 has been removed as the content is now

More information

TERMS AND CONDITIONS OF SERVICE

TERMS AND CONDITIONS OF SERVICE TERMS AND CONDITIONS OF SERVICE IMPORTANT NOTICE: DDos Protected ("The Company") agrees to furnish services to the Subscriber, subject to the following TOS (Terms of Service). Use of DDos Protected services

More information

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3 POLICY TITLE: Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June 12-2010 Approved By / Date: Final Draft reviewed

More information

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) DOCUMENT CONTROL: Version: V1 Ratified by: Risk Management Sub Group Date ratified:

More information

Bring Your Own Device (BYOD) for Staff and Visitors

Bring Your Own Device (BYOD) for Staff and Visitors Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source

More information

CHILD PROTECTION POLICY. City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)}

CHILD PROTECTION POLICY. City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)} CHILD PROTECTION POLICY City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)} Statement: We The School are committed to safeguarding and promoting the

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

Thinking Schools Academy Trust

Thinking Schools Academy Trust Thinking Schools Academy Trust Transforming Life Chances Management of Safeguarding Allegations Policy This policy was adopted on September 2015 The policy is to be reviewed on Page 1 of 18 Management

More information

Disciplinary and dismissal procedures for school staff

Disciplinary and dismissal procedures for school staff Revised guidance for governing bodies Guidance Welsh Assembly Government Circular Date of issue: procedures for school staff Audience Overview Action required Further information Additional copies Governing

More information

Bring Your Own Device 2015 Parent information evening

Bring Your Own Device 2015 Parent information evening Parent information evening Why BYOD? It s not about the tools - It s about using the tools to facilitate learning Research studies from the US and Canada show a significant increase in the level of student

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

Social Network Protocol & Policy

Social Network Protocol & Policy Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies

More information

Boothville Primary School. Dealing with Allegations against School Personnel, Volunteers, Headteacher or Pupils. Allegations

Boothville Primary School. Dealing with Allegations against School Personnel, Volunteers, Headteacher or Pupils. Allegations Dealing with against School Personnel, Volunteers, Headteacher or Pupils Dealing with against School Personnel, Volunteers, Headteacher or Pupils Date Sept 15 Review Date Sept 16 Designated Child Protection

More information

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date..

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date.. E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and

More information

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school. E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)

More information

Information Systems (IS) Visiting Worker Information Security Policy

Information Systems (IS) Visiting Worker Information Security Policy Information Systems (IS) Visiting Worker Information Security Policy www.afbini.gov.uk INFORMATION SYSTEMS (IS) VISITING WORKER INFORMATION SECURITY POLICY Reference: AFBI POL 02/09 Date: 25 March 2009

More information

Terms of Service Disclosure to Law Enforcement: Service Rates: Payment: Payments and Fees:

Terms of Service Disclosure to Law Enforcement: Service Rates: Payment: Payments and Fees: Terms of Service SouthBay Network (dba southbaynetwork.com) ("The Company") agrees to furnish services to the Subscriber, subject to the following TOS (Terms of Service). Use of SouthBay Network Service

More information

Disciplinary Policy, Procedure and Rules

Disciplinary Policy, Procedure and Rules Disciplinary Policy, Procedure and Rules HR Policy review 2005 Probationary Procedure Version 25 Final 17/04/08 1 Table of contents: The Policy 4 Aim of the Process 4 Sub-Standard Conduct 4 Key Principles

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

POLICY FOR DISSEMINATION FRONT SHEET

POLICY FOR DISSEMINATION FRONT SHEET POLICY FOR DISSEMINATION FRONT SHEET Name of Policy/Procedure or Guidance Core Group Procedures Who should read the objectives of this policy/procedure Those professionals who work with CYP in the Borough

More information

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom

More information

Cork ETB Data Breach Management Policy and Procedures

Cork ETB Data Breach Management Policy and Procedures Cork ETB Data Breach Management Policy and Procedures POLICY ON THE MANAGEMENT OF DATA BREACHES IN SCHOOLS/COLLEGES AND OTHER EDUCATION AND ADMINISTRATIVE CENTRES UNDER THE REMIT OF CORK EDUCATION AND

More information

Electronic Communications Guidance for School Staff 2013/2014

Electronic Communications Guidance for School Staff 2013/2014 Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible

More information

e-safety Policy for Hertsmere Jewish Primary School

e-safety Policy for Hertsmere Jewish Primary School e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy

More information

Safeguarding / Child Protection Policy

Safeguarding / Child Protection Policy Safeguarding / Child Protection Policy Policy statement on equality and diversity The School will promote equality of opportunity for students and staff from all social, cultural and economic backgrounds

More information

BANK VIEW HIGH SCHOOL

BANK VIEW HIGH SCHOOL BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Coláiste Pobail Bheanntraí

Coláiste Pobail Bheanntraí Coláiste Pobail Bheanntraí Seskin Bantry, Co. Cork. Principal: Dr. Kevin Healy B.A, H.D.E, M.Ed, Ed.D Deputy Principal: Mr. Denis O Sullivan, BSc. (Ed.), H.D.E Phone: 027 56434 Fax: 027 56439 E-mail: admin@colaistepobailbheanntrai.com

More information

Membership Application OTASA Scheme of Co-operation

Membership Application OTASA Scheme of Co-operation MEDICAL PROTECTION SOCIETY PROFESSIONAL SUPPORT AND EXPERT ADVICE Membership Application OTASA Scheme of Co-operation 012 362 5457 Please complete all parts of this form in BLACK INK and BLOCK CAPITALS

More information

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such

More information

Disciplinary policy INTRODUCTION

Disciplinary policy INTRODUCTION Disciplinary policy This policy forms part of your contract of employment. The councils are entitled to introduce minor and non-fundamental changes to this policy by notifying you of these changes in writing

More information

Wakefield and District Safeguarding Children Board. Safeguarding Training for Schools. Guidance Document

Wakefield and District Safeguarding Children Board. Safeguarding Training for Schools. Guidance Document Wakefield and District Safeguarding Children Board Safeguarding Training for Schools Guidance Document Introduction The purpose of this document is to provide advice and guidance to schools in relation

More information

Disciplinary Procedure

Disciplinary Procedure Disciplinary Procedure Consultation Period: 7 th October 2013 30 th April 2014 Date Approved by NET: 28 th March 2014 Next Review Date: September 2015 Disciplinary Procedure Contents Page 1. Introduction

More information

Work placement students undertaking work placement over a long period of time (one or two days per week over a period of two months or more)

Work placement students undertaking work placement over a long period of time (one or two days per week over a period of two months or more) Safeguarding Policy 1. Background In 2015 the Department for Education and Skills published a statutory guidance document Keeping Children Safe in Education on safeguarding and promoting the welfare of

More information

E-Safety Policy & Procedures

E-Safety Policy & Procedures E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:

More information

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document

More information

SOCIAL NETWORKING POLICY

SOCIAL NETWORKING POLICY SOCIAL NETWORKING POLICY Ratified 9 th March 2016 Reviewed Policy Authorisation Authorised Date By Version March 2016 Governors 1.0 Review Date Changes Made Next Review 1 SOCIAL NETWORKING POLICY This

More information

ONE TO ONE LAPTOP PROGRAMME POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...

More information

Havelock Academy Broadening Horizons

Havelock Academy Broadening Horizons Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all

More information

SCHOOLS FRAUD RESPONSE PLAN

SCHOOLS FRAUD RESPONSE PLAN SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of

More information

Processes for Managing Adult Membership in Girlguiding. Guidance notes for Commissioners

Processes for Managing Adult Membership in Girlguiding. Guidance notes for Commissioners Processes for Managing Adult Membership in Guidance notes for Commissioners Contents Introduction 3 Warning 4 Suspension 5 Restriction 6 Refusal 7 Withdrawal 8 Appeals 8 Making a risk assessment 9 Confidentiality

More information