The South Yorkshire County Trading Administration Safety Project
|
|
- Phoebe Todd
- 3 years ago
- Views:
Transcription
1 1 Purpose 1.1 The purpose of this procedure is to outline how settings where children and young people have access to the internet and other forms of technology should respond when there are breaches of esafety Policies including the Information Security and Computer Usage Policy and Protocols, and the ebehaviour Agreements, and where inappropriate materials are accessed. 2 Scope 2.1 This policy applies to staff, volunteers and young people in any settings who may have breached esafety Policies. 2.2 The policy also applies to a number of settings including schools, residential homes, libraries and other settings where young people have access to the Internet and other digital technologies. 3 References 3.1 The BECTA FITS framework and ITIL Incident Management process guidance has been consulted. 4 Definitions 4.1 Line : the most senior person in the agency responsible for safeguarding issues. Action to be taken when the breach is made by a member of staff Person Responsible
2 5.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been accessed the person who is made aware of this will report this to the agencies designated lead for esafety/safe guarding 5.2 The designated lead in the agency will conduct an initial fact finding investigation which will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 5.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 5.4 The head teacher/line manager will have been informed and should be given the results of the initial fact finding investigation 5.5 The head teacher/line manager will discuss the concerns with the Local Authority Designated Officer (LADO) in order to discuss whether there is a need for a Strategy Meeting. During this discussion consideration will be given as to whether the police need to be involved. The head teacher/line manager will also discuss with their HR advisers if the member of staff needs to be suspended or undertake different duties pending the completion of the enquiries. 5.6 The line manager/head teacher will also discuss the incident with the esafety lead in the Local Authority as consideration will need to be given to any further actions required. 5.7 Discussions will also need to take place between the local authority esafety lead and Strategic ICT lead to agree if the site(s) are blocked for the duration of the investigations. 5.8 The strategy meeting process will be completed following the South Yorkshire Child Protection Appendix 4 Allegations Against Staff Protocol Member of Staff aware of the incident esafety Lead 5.9 The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Action to be taken when a young person has been accessing inappropriate sites 6.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been access the person who is made aware of this will report this to the agencies designated lead for esafety/child protection 6.2 The designated lead in the agency will conduct an initial fact finding investigation who will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 6.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 6.4 The head teacher/line manager will have been informed and should then be given the results of the initial fact finding investigation Person Responsible Member of Staff aware of the incident Teacher/
3 6.5 The head teacher/line manager will discuss the concerns with the manager of the Assessment Team in their area to establish if there are child protection concerns requiring a Section 47 Child Protection investigation. If this is required the Assessment Team will conduct this investigation as required within the South Yorkshire Child Protection Procedures 6.6 If there is no child protection investigation a decision will be made between the head teacher/line manager and the duty social worker as to whether additional work will be completed with the young person and their family via an Initial Assessment or the Common Assessment Framework. This process will ensure that parents are fully aware of the concerns/incidents and they will be given advice and information about managing the internet, use of parental controls etc. 6.7 At the time that the incident is reported the computer/laptop will be removed. The esafety lead in the agency will ask BULL IT / the brokered IT supplier to investigate what has been accessed on the hard drive and will be asked to complete a report detailing the usage. This report will be made available to the agency, Strategic ICT and the lead for esafety in the authority. This report will be required to inform the investigations. Assistant Team Assessment Team esafety Lead/BULL IT/Brokered IT Supplier 6.8 The management of esafety within the agency will also need to be considered including any recommendations for additional training 6.9 After the completion of all investigations the head teacher/line manager will need to provide a report to the Local Authority lead/strategic ICT to outline the outcome of the work undertaken, updated risk assessments relating to the management of access to computers any identified training needs Discussions will take place based on the information available to decide whether it is appropriate for the site(s) to be unblocked and Strategic ICT will arrange the unblocking of the site and the notification to the agency/other agencies who also need access to the site The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Strategic ICT esafety lead
4 Appendix 1: Flow chart showing the processes to be followed when breach of esafety Policy is made by a member of staff: Breach of esafety Policies Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Member of Staff accessing inappropriate sites Inform head teacher/line manager teacher/line manager discusses with LADO HR Police Discussion esafety lead LA blocking of site Strategy Meeting Needed Able to Continue in Employment Criminal Matter Yes/No esafety lead discusses with SICT lead Strategy Meeting Site Blocked Pending Completion of Investigation No further action teacher/line manager discuss with member of staff e-safety breach, ensure any training offered refresh of policies and procedures by member of staff Breach of the policy confirmed Police Involvement Discussion with e-safety leads re. unblocking of the site subject to internal actions completed Appendix 2: Suspension management investigation by employer Breach of esafety AUP Complete incident log & send to LA
5 Flow chart showing the processes to be followed when breach of esafety Policy is made by a young person: Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Young Person Inform head teacher/line manager Discussion with Assessment Team Discussion esafety lead in LA re. blocking of site S47 Investigation No S47 esafety lead discusses with SICT lead No Further Action Discuss and agree if work undertaken via CAF/Initial Assessment Site Blocked Pending Completion of Investigation Child Protection Conference Child Protection Plan for Child Agree with agency any additional work Complete incident log & send to LA
RIPA (Regulations and Investigatory Powers Act)
Dartmoor National Park Authority INTERNET MONITORING POLICY & INVESTIGATION PROTOCOL Approved: February 2010 Review Date: September 2010 1. Introduction Private use of the computer facilities is covered
More informationU 16 Internet Monitoring Policy & Investigation Protocol
Dartmoor National Park Authority U 16 Internet Monitoring Policy & Investigation Protocol February 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted
More informationHow To Deal With Abuse In A School
Guidance for schools on dealing with Allegations of abuse against Staff and Volunteers Guidance for schools on dealing with Allegations of abuse against Staff and Volunteers 2 CONTENTS 1. Introduction
More informationHow To Deal With An Allegation Of Sexual Abuse In A School
1 Model Allegations Management Policy for Knowsley Schools and Education Settings July 2015 Introduction 1. All schools and education settings have a duty to promote and safeguard the welfare of children
More informationModel procedure for schools responding to allegations of abuse by teachers and other school staff. September 2011 Schools HR Consultancy
Model procedure for schools responding to allegations of abuse by teachers and other school staff Summary September 2011 Schools HR Consultancy The Department of Education has produced statutory guidance
More informationNATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES
NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES Disciplinary Procedure 1 1.1 Introduction This procedure provides guidance on disciplinary issues. The procedure is endorsed by the National Joint
More informationResponding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club
Responding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club Across cricket, at all levels, there is a requirement to have clear and unambiguous procedures in place in respect
More informationBerwick Academy Policy on E Safety
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
More informationHow To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
More informationWitton Middle School
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
More informationRoles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
More informationSt Vincent s Catholic Primary School e-safety Policy
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
More informationJohn of Rolleston Primary School
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
More informationThis procedure applies where formal disciplinary action is commenced on or after 11 December 2013
Appendix X Disciplinary Procedure This procedure applies where formal disciplinary action is commenced on or after 11 December 2013 1 Purpose 1.1 This procedure is designed to help and encourage all employees
More informationEmployment Policies, Procedures & Guidelines for Schools
DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES July 2014 1 ABOUT THIS GUIDANCE This is statutory
More informationDevelopment / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
More informationE-Safety Policy and Regulations at School
Chailey School - E-Safety Policy WHAT IS E-SAFETY? Chailey School sees the area of E-Safety as a child protection issue and not one that is solely evident in ICT. All staff and students have a duty to
More informationEmployment Policies, Procedures & Guidelines for Schools
DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES March 2012 1 ABOUT THIS GUIDANCE This is
More informationE- Safety and Digital Photography - College ICT
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
More informationGuidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors
Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors Policy Nr 109 Published 30-Jun-15 Page 1 of 5 Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors School Guidelines
More informationOratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY
Oratory R.C. Primary and Nursery School Shine as to be a light to others E-SAFETY POLICY Reviewed by Safeguarding, Health and Safety and Premises Committee: 1.10.14 Approved by the Governing Body: 15.10.14
More informationRecords Retention and Disposal Schedule. Information Management
Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,
More informationSafeguarding children online
Schools January 2008 Safeguarding children online A guide for school leaders www.becta.org.uk/schools/safety Using technology safely Safeguarding children online 01 In the physical world it s relatively
More informationUniversity of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
More informationE-Safety Policy. Please read this policy in conjunction with the policies listed below:
E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection
More informationKing David Primary School Staff Social Networking Policy
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
More informationSocial Networking Policy
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
More informationTERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.
TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following
More informationSALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL
SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING
More informationP319 Internet (including social networking) and email usage in schools and academies Model policy
Contents (If you are viewing this document online, click on the headings below to jump to the relevant section) 1. Introduction... 1 2. Internet use... 2 3. Email use... 2 4. Data protection, freedom of
More informationNetworking and Social Media Policy
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
More informationGREAT WALTHAM C of E PRIMARY SCHOOL
GREAT WALTHAM C of E PRIMARY SCHOOL CHILD PROTECTION POLICY JULY 2015 Approved by Staff July 2015 Adopted by Governors of the FGB Committee July 2015 Recommended Review Date July 2016 1 KEY CONTACTS WITHIN
More informationSt Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
More informationSchool Child Protection & Safeguarding Policy 2014/2015
School Child Protection & Safeguarding Policy 2014/2015 Abbey Park Primary Academy Child Protection & Safeguarding Policy 2014/2015 The Acting Principal is Emme Ford This policy was developed on the 10
More informationRoskear Primary & Nursery School. E-Safety Policy
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
More informationAcceptable Use of Internet and Digital Technology
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
More information360 Degree Safe Cymru SELF REVIEW TOOL
360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: enquiries@swgfl.org.uk
More informationE-SAFETY POLICY. The Kingswinford School - a science college. December 2014. Every Child a Scientist. Page 1
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
More informationDealing with Allegations of Abuse Against Staff in Schools. Practice Guidance
Dealing with Allegations of Abuse Against Staff in Schools Practice Guidance About this guidance This is statutory guidance from the Department for Education. Schools and colleges must have regard to it
More informationSchool Discipline - Standard of Procedure
STAFF DISCIPLINARY PROCEDURE Current document may be accessed under the policies tab at: www.warblington.hants.sch.uk Document Control Baseline Document Comments/ Scheduled Review Date Action/ Reviewed
More informationDISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF
DISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF Based on Leeds City Council recommendations January 2012 1 CONTENTS 1. Introduction 2. Scope of the Procedure 3. Core Principles 4. Management of
More informationData Breach Management Policy and Procedures for Education and Training Boards
Data Breach Management Policy and Procedures for Education and Training Boards POLICY on DATA BREACHES in SCHOOLS/COLLEGES and OTHER EDUCATION and ADMINISTRATIVE CENTRES UNDER the REMIT of TIPPERARY EDUCATION
More information1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner
Policy Details 1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner 4. Date created February 2015 5. Date of
More informationSt Edward s Church of England Academy. E-Safety Policy
St Edward s Church of England Academy E-Safety Policy Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationInformation governance guidance for schools
Information governance guidance for schools Guidance Guidance document no: 186/2015 Date of issue: September 2015 Information governance guidance for schools Audience All staff, governors and learners
More informationIslington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
More informationPOLICIES AND PROCEDURES DISCIPLINARY POLICY
POLICIES AND PROCEDURES DISCIPLINARY POLICY Date Approved Version Issue Date Review Lead Person by Trust Board Date 27 Sept 2011 Three 01/10/2011 30/09/13 Head of Personnel Procedure/Policy Number PP08
More informationWilsthorpe Community School
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
More informationE-Safety Policy Last reviewed 2012 Updated October 2014
E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationStaff Investigation Protocol
Version: 3.0 Document author(s): Stuart Selkirk Approved by: Executive Partnership Forum Date approved: 17 July 2014 Review date: 30 September 2016 Document scope: Trust-wide Version History Log Use this
More informationAccess Control and Account Management Policy Version 1.8 9 May 2015
Information Security Management Access Control and Account Management Policy Version 1.8 9 May 2015 University of Leeds 2015 The intellectual property contained within this publication is the property
More informationCaedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
More informationACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER
ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER We want you to feel safe all the time. Make sure you: o always keep your passwords a secret o only open pages which your teacher has said are OK o only
More informationProtocol for Acceptable Use of Internet and Email by Staff E-Safety Procedures Safeguarding & Child Protection Policy
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
More informationHow To Get A Credit Card From Dsostingprotection
Terms of Service IMPORTANT NOTICE: *All Payments To DDoshostingprotection Are Non-Refundable* "DDoshostingprotection") agrees to furnish services to the Subscriber, subject to the following TOS (Terms
More informationPROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013
1.0 Summary of Changes Amendments to the 1 st bullet point of section 4.5 and the 3 rd, 4 th, 6 th and 7 th bullet point in section 4.8 have been made. Section 4.9 has been removed as the content is now
More informationTERMS AND CONDITIONS OF SERVICE
TERMS AND CONDITIONS OF SERVICE IMPORTANT NOTICE: DDos Protected ("The Company") agrees to furnish services to the Subscriber, subject to the following TOS (Terms of Service). Use of DDos Protected services
More informationCONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3
POLICY TITLE: Policy POLICY #: CIO-ITSecurity 09.1 Initial Draft By - Position / Date: D. D. Badger - Dir. PMO /March-2010 Initial Draft reviewed by ITSC/June 12-2010 Approved By / Date: Final Draft reviewed
More informationStandard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)
Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI) DOCUMENT CONTROL: Version: V1 Ratified by: Risk Management Sub Group Date ratified:
More informationBring Your Own Device (BYOD) for Staff and Visitors
Bring Your Own Device (BYOD) for Staff and Visitors Version 1.01 01.16 Created April 2015 Reviewed by Education and staffing Committee 21.01.16 Review Cycle Triennial Next review September 2019 Source
More informationCHILD PROTECTION POLICY. City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)}
CHILD PROTECTION POLICY City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)} Statement: We The School are committed to safeguarding and promoting the
More informationE-Safety and Acceptable Use Policy
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
More informationThinking Schools Academy Trust
Thinking Schools Academy Trust Transforming Life Chances Management of Safeguarding Allegations Policy This policy was adopted on September 2015 The policy is to be reviewed on Page 1 of 18 Management
More informationDisciplinary and dismissal procedures for school staff
Revised guidance for governing bodies Guidance Welsh Assembly Government Circular Date of issue: procedures for school staff Audience Overview Action required Further information Additional copies Governing
More informationBring Your Own Device 2015 Parent information evening
Parent information evening Why BYOD? It s not about the tools - It s about using the tools to facilitate learning Research studies from the US and Canada show a significant increase in the level of student
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationSocial Network Protocol & Policy
Social Network Protocol & Policy Prepared by: Stoke HR Implementation Date: July 2015 Review date: July 2016 RAISING ASPIRATIONS. TRANSFORMING LIVES. Social Networking Protocol for Schools & Academies
More informationBoothville Primary School. Dealing with Allegations against School Personnel, Volunteers, Headteacher or Pupils. Allegations
Dealing with against School Personnel, Volunteers, Headteacher or Pupils Dealing with against School Personnel, Volunteers, Headteacher or Pupils Date Sept 15 Review Date Sept 16 Designated Child Protection
More informationE-SAFETY POLICY. Signed. for school. Signed for Governors. Date..
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
More informationE-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
More informationInformation Systems (IS) Visiting Worker Information Security Policy
Information Systems (IS) Visiting Worker Information Security Policy www.afbini.gov.uk INFORMATION SYSTEMS (IS) VISITING WORKER INFORMATION SECURITY POLICY Reference: AFBI POL 02/09 Date: 25 March 2009
More informationTerms of Service Disclosure to Law Enforcement: Service Rates: Payment: Payments and Fees:
Terms of Service SouthBay Network (dba southbaynetwork.com) ("The Company") agrees to furnish services to the Subscriber, subject to the following TOS (Terms of Service). Use of SouthBay Network Service
More informationDisciplinary Policy, Procedure and Rules
Disciplinary Policy, Procedure and Rules HR Policy review 2005 Probationary Procedure Version 25 Final 17/04/08 1 Table of contents: The Policy 4 Aim of the Process 4 Sub-Standard Conduct 4 Key Principles
More informationDATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
More informationSocial Networking Policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
More informationPOLICY FOR DISSEMINATION FRONT SHEET
POLICY FOR DISSEMINATION FRONT SHEET Name of Policy/Procedure or Guidance Core Group Procedures Who should read the objectives of this policy/procedure Those professionals who work with CYP in the Borough
More informationProcedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
More informationCork ETB Data Breach Management Policy and Procedures
Cork ETB Data Breach Management Policy and Procedures POLICY ON THE MANAGEMENT OF DATA BREACHES IN SCHOOLS/COLLEGES AND OTHER EDUCATION AND ADMINISTRATIVE CENTRES UNDER THE REMIT OF CORK EDUCATION AND
More informationElectronic Communications Guidance for School Staff 2013/2014
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
More informatione-safety Policy for Hertsmere Jewish Primary School
e-safety Policy for Hertsmere Jewish Primary School Reviewed by: Mrs R Wolman, Miss C Stephens and Miss G Geffin Reviewed on: February 2015 Date of Next Review: February 2016 Policy Review This policy
More informationSafeguarding / Child Protection Policy
Safeguarding / Child Protection Policy Policy statement on equality and diversity The School will promote equality of opportunity for students and staff from all social, cultural and economic backgrounds
More informationBANK VIEW HIGH SCHOOL
BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationColáiste Pobail Bheanntraí
Coláiste Pobail Bheanntraí Seskin Bantry, Co. Cork. Principal: Dr. Kevin Healy B.A, H.D.E, M.Ed, Ed.D Deputy Principal: Mr. Denis O Sullivan, BSc. (Ed.), H.D.E Phone: 027 56434 Fax: 027 56439 E-mail: admin@colaistepobailbheanntrai.com
More informationMembership Application OTASA Scheme of Co-operation
MEDICAL PROTECTION SOCIETY PROFESSIONAL SUPPORT AND EXPERT ADVICE Membership Application OTASA Scheme of Co-operation 012 362 5457 Please complete all parts of this form in BLACK INK and BLOCK CAPITALS
More informationSTAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY
Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such
More informationDisciplinary policy INTRODUCTION
Disciplinary policy This policy forms part of your contract of employment. The councils are entitled to introduce minor and non-fundamental changes to this policy by notifying you of these changes in writing
More informationWakefield and District Safeguarding Children Board. Safeguarding Training for Schools. Guidance Document
Wakefield and District Safeguarding Children Board Safeguarding Training for Schools Guidance Document Introduction The purpose of this document is to provide advice and guidance to schools in relation
More informationDisciplinary Procedure
Disciplinary Procedure Consultation Period: 7 th October 2013 30 th April 2014 Date Approved by NET: 28 th March 2014 Next Review Date: September 2015 Disciplinary Procedure Contents Page 1. Introduction
More informationWork placement students undertaking work placement over a long period of time (one or two days per week over a period of two months or more)
Safeguarding Policy 1. Background In 2015 the Department for Education and Skills published a statutory guidance document Keeping Children Safe in Education on safeguarding and promoting the welfare of
More informationE-Safety Policy & Procedures
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
More informationRelated Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
More informationSOCIAL NETWORKING POLICY
SOCIAL NETWORKING POLICY Ratified 9 th March 2016 Reviewed Policy Authorisation Authorised Date By Version March 2016 Governors 1.0 Review Date Changes Made Next Review 1 SOCIAL NETWORKING POLICY This
More informationONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
More informationHavelock Academy Broadening Horizons
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationBring Your Own Device Policy
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
More informationSCHOOLS FRAUD RESPONSE PLAN
SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of
More informationProcesses for Managing Adult Membership in Girlguiding. Guidance notes for Commissioners
Processes for Managing Adult Membership in Guidance notes for Commissioners Contents Introduction 3 Warning 4 Suspension 5 Restriction 6 Refusal 7 Withdrawal 8 Appeals 8 Making a risk assessment 9 Confidentiality
More information