1 E-Safety Policy Policy Code: ICT2 Policy Start Date: July 2015 Policy Review Date: September 2015 Please read this policy in conjunction with the policies listed below: SW5 Safeguarding and Child Protection Policy HR5 ICT Acceptable Use Policy HR22 Social Media (Employee) Policy Staff Disciplinary Policy HR23 Whistleblowing Policy SW6 Anti-Bullying Policy
2 E-Safety Ref. ICT2 Page 1 of Policy Statement The Priory Federation of, hereafter known as The Trust, takes e-safety seriously. This policy is an extension of the ICT Acceptable Use Policy and is to provide guidance and procedures to ensure safe practice when working in the changing world of ICT. This policy applies to all members of The Trust community (including staff, students, volunteers, parents/carers, visitors, governors) who have access to and are users of Federation ICT systems, both in and out of the Academy. The Education and Inspections Act 2006 empowers Headteachers to such extent as is reasonable, to regulate the behaviour of students when they are off the Academy site and empowers members of staff to impose disciplinary penalties for inappropriate behaviour. This is pertinent to incidents of cyberbullying, or other e-safety incidents covered by this policy, which may take place outside of the Academy, but is linked to membership of the Academy or Federation. The Academy will, where known, inform parents/carers of incidents of inappropriate e-safety behaviour that take place out of the Academy. 2. Schedule for Development, Monitoring and Review The implementation of this E-Safety policy will be monitored by the: Monitoring will take place at regular intervals: E-safety Coordinator; Designated Safeguarding Officer; Director of Student Welfare; The Trust. Annually. The Academy Committee members will receive a report on the implementation of the e-safety policy generated by the monitoring group (which will include anonymous details of e-safety incidents) at regular intervals: At each Academy Committee meeting (3 times a year). The E-Safety Policy will be reviewed annually, or more regularly in the light of any significant new developments in the use of the technologies, new threats to e-safety or incidents that have taken place. The next anticipated review date will be: Should serious e-safety incidents take place, the following external persons / agencies should be informed: September Academy Designated Safeguarding Officer; LADO (Local Authority Designated Officer); Director of Student Welfare; Police; Academy SLT.
3 E-Safety Ref. ICT2 Page 2 of Review The Academies will monitor the impact of the policy using logs of reported incidents through the pastoral systems; monitoring logs of internet activity (including sites visited); internal monitoring data for network activity; surveys/questionnaires of students, parents/carers and staff. 3. Responsibilities This E-Safety Policy has been developed by a working group of the Executive Committee, Strategic IT Coordinator, Staff (including teachers, support staff and technical staff) and Governors. 3.1 General The Headteacher has a duty of care for ensuring the safety (including e- safety) of members of the Academy community, although the day-to-day responsibility for e-safety will be delegated to a nominated member of staff, to be known as the E-Safety Co-ordinator. The Headteacher and (at least) one other member of the Senior Leadership Team at each Academy are to be aware of the procedures to be followed in the event of a serious e-safety allegation being made against a member of staff (see Section 9). The Senior Leadership Team will receive monitoring reports from the E- Safety Co-ordinator. 3.2 E-Safety Co-ordinator The E-Safety Co-ordinator is responsible for: Leading e-safety at the Academy. Taking day-to-day responsibility for e-safety issues and has a leading role in establishing and reviewing the Trust s E-Safety Policy/supporting documents. Undertaking suitable training to ensure they can carry out their role and to train other colleagues, as relevant. Ensuring that all staff are aware of the procedures that need to be followed in the event of an e-safety incident taking place. Providing training and advice for staff. Liaising with the Local Authority/relevant body. Liaising with Federation technical staff. Receiving reports of e-safety incidents and using these to inform future e- safety developments. Meeting regularly with the Director of Student Welfare to discuss current issues, review incident logs and control logs
4 E-Safety Ref. ICT2 Page 3 of 15 Attending relevant meetings/committee meetings. Reporting regularly to Senior Leadership Team. 3.3 The Designated Safeguarding Officer The DSO should be trained in e-safety issues and be aware of the potential for serious safeguarding issues to arise from: Sharing of personal data. Access to illegal/inappropriate materials. Inappropriate on-line contact with adults/strangers. Potential or actual incidents of grooming. Cyber-bullying. 3.4 Technical Support Team The Technical Support Team is responsible for ensuring: That the Academies technical infrastructure is secure and is not open to misuse or malicious attack. That each Academy meets required e-safety technical requirements and any E-Safety Policy guidance that may apply. That users may only access the networks and devices through a properly enforced password protection policy, in which passwords will be encouraged to be complex and changed regularly. That the filtering policy is applied and updated on a regular basis. That they keep up-to-date with e-safety technical information in order to effectively carry out their e-safety role and to inform and update others as relevant. That use of the network/internet/virtual Learning Environment/remote access/ is regularly monitored in order that any misuse/attempted misuse can be reported to senior leaders for investigation. That monitoring software/systems are implemented and updated as agreed in Trust policies. 3.5 Teaching and Support Staff Teaching and support staff are responsible for ensuring that: They have an up-to-date awareness of e-safety matters and of the current Trust E-Safety policy. They have read and understood the Staff Acceptable Use Policy (AUP) and signed the agreement.
5 E-Safety Ref. ICT2 Page 4 of 15 They report any suspected misuse or problem to senior staff for investigation/action/sanction. All digital communications with students/parents/carers should be on a professional level and only carried out using official Academy systems. Students understand and follow the E-Safety and Acceptable Use Policies. Students have a good understanding of research skills and the need to avoid plagiarism and uphold copyright regulations. They monitor the use of digital technologies, mobile devices, cameras etc. in lessons and other Academy activities (where allowed) and implement current policies with regard to these devices. In lessons where internet use is pre-planned, students should be guided to sites checked as suitable for their use and that processes are in place for dealing with any unsuitable material that is found in internet searches. When using social media they adhere to the Social Media (Employee) Policy. 3.6 Students Students are responsible for: Using the Federation digital technology systems in accordance with the Acceptable Use Policy. They will also: Have a good understanding of research skills and the need to avoid plagiarism and uphold copyright regulations. Need to understand the importance of reporting abuse, misuse or access to inappropriate materials and know how to do so. Be expected to know, understand and adhere to this policy with regards to the use of mobile devices and digital cameras and the taking/use of images and on cyber-bullying. Understand the importance of adopting good e-safety practice when using digital technologies out of school and realise that the Trust s E-Safety Policy covers their actions out of school, if related to their membership of the school. 3.7 Parents/Carers Parents/Carers play a crucial role in ensuring that their children understand the need to use the internet/mobile devices in an appropriate way. Each Academy will take every opportunity to help parents understand these issues through parents evenings, newsletters, letters, pages on the Academy website and information about national/local e-safety campaigns and literature. Parents and carers will be encouraged to support the Academies in
6 E-Safety Ref. ICT2 Page 5 of 15 promoting good e-safety practice and to follow guidelines on the appropriate use of: Digital and video images taken at Academy events. Access to parents sections of the website/virtual Learning Environment and online student records. Their children s personal devices in the Academies (where this is allowed). 3.8 Community Users Community Users who access Academy systems/websites/virtual Learning Environment as part of the wider Federation provision will be expected to read the Acceptable Use Policy before they log in to any network resources. A warning appears on screen for all new users for this and the policy is available externally on the Federation website. 3.9 Governors In each Academy there will be a nominated member of the Committee who will take on responsibility for reviewing the effectiveness of this policy. This is likely to be the governor who has responsibility for child protection. The role of the E-Safety governor will be to: Attend regular meetings with the E-Safety Co-ordinator. Regularly monitor the e-safety incidents log. Report any e-safety issues to the Committee at the Academy Committee meetings. 4 Education of E-Safety 4.1 Education - Students E-safety is a focus in all areas of the curriculum and staff should reinforce e- safety messages across the curriculum. A planned e-safety curriculum is provided as part of Computing and PDP lessons. This is reviewed annually (or sooner if an issue occurs which requires attention). Key e-safety messages are reinforced as part of a planned programme of assemblies and tutorial/pastoral activities. Key messages on self-esteem and positive relationships are reinforced through the PDP curriculum. Students are taught to be critically aware of the materials/content they access online and be guided to validate the accuracy of information.
7 E-Safety Ref. ICT2 Page 6 of 15 Students are helped to understand the need for the Acceptable Use Agreement and encouraged to adopt safe and responsible use both within and outside the Academy. Staff act as good role models in their use of digital technologies, the internet and mobile devices. Where students are allowed freely to search the internet, staff will monitor the content of the websites the young people visit. 4.2 Education - Parents/Carers Each Academy seeks to provide information and awareness to parents and carers through: Curriculum activities. Letters, newsletters, website, Virtual Learning Environment. Information evenings/sessions for parents/carers. High-profile events and campaigns, e.g. Safer Internet Day. Reference to the relevant websites/publications. A series is published on each Academy s website. 4.3 Education Staff/Volunteers A planned programme of formal e-safety training will be made available to staff. This is reviewed annually (or sooner if an issue occurs which requires attention). All new staff should receive training as part of their induction programme, ensuring that they fully understand the school E-Safety Policy and Acceptable Use Policy. The E-Safety Coordinator and Designated Safeguarding Officer will receive regular updates through attendance at external training events and by reviewing guidance documents released by relevant organisations. This E-Safety policy and its updates will be presented to, and discussed by, staff in staff meetings/training sessions. The E-Safety Coordinator will provide advice/guidance/training to individuals as required. 4.4 Education - Governors Governors should take part in e-safety training/awareness sessions, with particular importance for the governor whose role incorporates e-safety and child protection. This may be offered in a number of ways: Attendance at training provided by the Local Authority/National Governors Association or other relevant organisation. Participation in school training/information sessions for staff or parents (this may include attendance at assemblies/lessons).
8 E-Safety Ref. ICT2 Page 7 of 15 5 Technical Strategy There will be regular discussions and audits of the safety and security of Academy technical systems through the weekly IT management meetings. Servers, wireless systems and cabling are securely located and physical access restricted. All users have clearly defined access rights to Academy technical systems and devices. All users (at KS2 and above) will be provided with a username and secure password. Users are responsible for the security of their username and password. Internet access is filtered for all users. Illegal content (e.g. child sexual abuse images) is filtered by the broadband or filtering provider. The Federation will also establish appropriate levels of filtering to ensure students are safe from terrorist and extremist material. Content lists are regularly updated and internet use is logged and regularly monitored. The Federation uses an intelligent system to monitor internet usage which responds to patterns of behaviour and intelligently scans pages for inappropriate content. Staff and students can request for filters to be taken off specific sites, where technical staff will assess suitability and escalate to senior staff if needed. The Federation has enhanced/differentiated user-level filtering with different restrictions for user groups, e.g. staff, boarders etc. Federation technical staff regularly monitor and record the activity of users on the Federation s technical systems and users are made aware of this in the Acceptable Use Agreement. Monitoring systems are in place to protect the servers, firewalls, routers, wireless systems, work stations, mobile devices, etc. from accidental or malicious attempts which might threaten the security of the Federation s systems and data. These are tested regularly. The Federation infrastructure and individual workstations are protected by up-to-date antivirus software. An agreed policy is in place for the provision of temporary access of guests (e.g. trainee teachers, supply teachers, visitors) onto the school systems. Staff and students are restricted from downloading executable files and installing programmes on school devices. 6 Bring Your Own Device (BYOD) Staff and students are allowed to bring their own devices into certain lessons and areas of the Federation.
9 E-Safety Ref. ICT2 Page 8 of 15 Users are encouraged to use the secure virtualisation systems for application access. Filtered wireless internet is available to users in the Federation. In boarding, a monitored, but more relaxed filtering system is used. The Academies have a set of clear expectations and responsibilities for all users. The Federation adheres to the Data Protection Act principles. All users are provided with and accept the Acceptable Use Agreement. All network systems are secure and access for users is differentiated. All users will use their username and password and keep this safe. Regular audits and monitoring of usage will take place to ensure compliance. 7 Use of digital and video images When using digital images, staff inform and educate students about the risks associated with the taking, use, sharing, publication and distribution of images, in particular the risks attached to publishing their own images on the internet, e.g. on social networking sites. In accordance with guidance from the Information Commissioner s Office, parents/carers are welcome to take videos and digital images of their children at Academy events for their own personal use (as such use is not covered by the Data Protection Act) providing they have sought permission from the relevant Academy. To respect everyone s privacy and in some cases protection, these images should not be published/made publicly available on social networking sites, nor should parents/carers comment on any activities involving other students in the digital/video images. Staff and volunteers are allowed to take digital/video images to support educational aims, but must follow Trust policies concerning the sharing, distribution and publication of those images. Those images should only be taken on Academy equipment; the personal equipment of staff should not be used for such purposes. Care should be taken when taking digital/video images that students are appropriately dressed and are not participating in activities which might bring the individuals or the Academy into disrepute. Students must not take, use, share, publish or distribute images of others without their permission. Photographs published on the website or elsewhere that include students will be selected carefully to protect the identity of the student and to ensure the school s commitment to safeguarding children and young people is upheld. Consideration will be given in each case whether to use a student s full name on a website or blog, particularly in association with photographs.
10 E-Safety Ref. ICT2 Page 9 of 15 Permission from parents/carers to use students pictures and videos in school work and promotion is taken when students join the school. 8 Unsuitable/inappropriate activities The Trust believes that staff should not engage in unsuitable or inappropriate activities in school or outside school when using Academy equipment or systems. Such activities, in addition to unlawful behaviour, might include accessing pornography, promoting discrimination, threatening behaviour, racist material and any other actions which breach the principles of this E- Safety Policy. 8.1 Social Media - Protecting Professional Identity The Federation provides the following measures to ensure reasonable steps are in place to minimise risk of harm to students, staff and the Federation: Training which includes: acceptable use; social media risks; checking of settings; data protection; reporting issues. Clear reporting guidance: including responsibilities, procedures and sanctions. Risk assessment, including legal risk. Academy staff should ensure that: No reference is to be made in social media to students, parents/carers or Academy staff and that they do not engage in online discussion on personal matters relating to members of the Academy community. Personal opinions are not to be attributed to the Academy or governing body. They regularly check security settings on personal social media profiles to minimise risk of loss of personal information. They have read and are aware of the Social Media (Employee) Policy which is available on the Federation website. 8.2 User Actions Some internet activity e.g. accessing child abuse images or distributing racist material is illegal and is banned from Federation and all other technical systems and could lead to criminal prosecution. Other activities e.g. cyberbullying, would also be banned.
11 Acceptable Acceptable at certain times Acceptable for nominated users Unacceptable Unacceptable and illegal The Priory Federation of E-Safety Ref. ICT2 Page 10 of 15 The Trust believes that the activities referred to in the following section would be inappropriate in a school context and that users, as defined below, should not engage in these activities in school or outside school when using school equipment or systems. Some examples of restricted usage are as follows: Users shall not visit Internet sites, make, post, download, upload, data transfer, communicate or pass on, material, remarks, proposals or comments that contain or relate to: Child sexual abuse images The making, production or distribution of indecent images of children. Contrary to The Protection of Children Act 1978 Grooming, incitement, arrangement or facilitation of sexual acts against children Contrary to the Sexual Offences Act Possession of an extreme pornographic image (grossly offensive, disgusting or otherwise of an obscene character) Contrary to the Criminal Justice and Immigration Act 2008 Criminally racist material in UK to stir up religious hatred (or hatred on the grounds of sexual orientation) - contrary to the Public Order Act 1986 Articles, images, speeches or videos that promote terrorism; content encouraging people to commit acts of terrorism; websites made by terrorist organisations; videos of terrorist attacks. Using school systems to run a private business Pornography Promotion of any kind of discrimination Threatening behaviour, including promotion of physical violence or mental harm Any other information which may be offensive to colleagues or breaches the integrity of the ethos of the school or brings the school into disrepute Using systems, applications, websites or other mechanisms that bypass the filtering or other safeguards employed by the school / academy Infringing copyright Revealing or publicising confidential or proprietary information (eg financial / personal information, databases, computer / network access codes and passwords)
12 E-Safety Ref. ICT2 Page 11 of 15 Creating or propagating computer viruses or other harmful files Unfair usage (downloading / uploading large files that hinders others in their use of the internet) File sharing Use of social media Use of messaging apps Use of video broadcasting eg Youtube 8.3 Reporting incidents of misuse The Trust has a duty of care to all students and staff to ensure they are safe to work, learn and develop unimpeded by fear. Students are encouraged to report any incidents of misuse to a member of staff or trusted adult immediately. Any reported incidents will be taken seriously by The Federation. Where bullying is found to have taken place by any means, whether on-site or off-site, including cyber-bullying, robust action shall be taken to protect the wellbeing of students and staff. In all our communications, whether written, spoken, texted, ed or published on websites, we must treat other people with respect. Even if we disagree with another person, fall out with them, or become angry with them, we should state our case clearly and respectfully. If you feel you are being bullied by , text or online, do talk to someone you trust. Never send any bullying or threatening messages. Anything you write and send could be read by an adult. Serious bullying should be reported to a member of staff; in some cases The Academy will inform the police - for example, threats of a physical or sexual nature. Keep and save any bullying s, text messages or images. If you can, make a note of the time and date bullying messages or images were sent, and note any details about the sender. Don't reply to bullying or threatening text messages or s - this could make matters worse. It also lets the bullying people know that they have found a 'live' phone number or address. They may get bored quite quickly if you ignore them. Don't forward abusive texts or s or images to anyone. You could be breaking the law just by forwarding them. If they are about you, keep them as evidence. If they are about someone else, report them to a member of staff or trusted adult. Do not reply to the sender.
13 E-Safety Ref. ICT2 Page 12 of 15 Don't ever give out passwords to your mobile or account. Remember that sending abusive or threatening messages is against the law. 9 Responding to incidents of misuse This guidance is intended for use when staff need to manage incidents that involve the use of online services. It encourages a safe and secure approach to the management of the incident. Incidents might involve illegal or inappropriate activities. 9.1 Illegal Incidents If there is any suspicion that the website(s) concerned may contain child abuse images, or if there is any other suspected illegal activity, the DSOs at each academy are to be contacted immediately. The contact details for each of the Academies Lead DSOs and DSOs will be posted appropriately throughout the Academy and all staff are to be made aware of the DSOs at staff briefings on a regular basis and as part of staff induction. In the event that a DSO or LDSO is not immediately available, a member of the Senior Leadership Team is to be alerted at once (in line with the Federation s safeguarding procedures). The DSO/LDSO/SLT will notify the Headteacher and the Director of Student Welfare (DSW). The DSW is available outside Academy hours on 4355 (internally) or The DSW will notify the police. Where necessary the DSW and Head of HR will notify the LADO (Local Authority Designated Officer) accordingly. The Trust s Staff Disciplinary Policy will be invoked if required. 9.2 Other Incidents It is hoped that all members of the Federation community will be responsible users of digital technologies, and will understand and follow Trust policy. However, there may be times when infringements of the policy could take place, through careless or irresponsible or, very rarely, deliberate misuse. In the event of suspicion, all steps in this procedure should be followed: If there is any suspicion that any Academy user has been involved in inappropriate or unsuitable activity, the DSO at the relevant Academy is to be contacted immediately.
14 E-Safety Ref. ICT2 Page 13 of 15 The DSO will escalate the case as described in 9.1 and, if the incident involves a member of staff, the DSW/Head of HR will decide the nature of any investigation, in line with the Trust s Staff Disciplinary Policy. Have more than one senior member of staff/volunteer involved in any investigation process. This is vital to protect individuals if accusations are subsequently reported. Conduct the procedure using a designated computer that will not be used by young people and if necessary can be taken off site by the police should the need arise. Use the same computer for the duration of the procedure. It is important to ensure that the relevant staff should have appropriate internet access to conduct the procedure, but also that the sites and content visited are closely monitored and recorded (to provide further protection). Record the URL of any site containing the alleged misuse and describe the nature of the content causing concern. It may also be necessary to record and store screenshots of the content on the machine being used for investigation. These may be printed, signed and retained in an evidence file (except in the case of images of child sexual abuse see below). Once this has been completed and fully investigated, the group will need to judge whether this concern has substance or not. If it does, then appropriate action will be required and could include the following: Internal response or continuing disciplinary procedures. Involvement by Local Authority or national/local organisation (as relevant). Police involvement and/or action. If content being reviewed includes images of child abuse, then the monitoring should be halted and referred to the Police immediately. Other instances to report to the police would include: Incidents of grooming behaviour. The sending of obscene materials to a child. Adult material which potentially breaches the Obscene Publications Act. Criminally racist material. Other criminal conduct, activity or materials. The computer in question should be isolated. Any change to its state may hinder a later police investigation. It is important that all of the above steps are taken as they will provide an evidence trail for the Trust and possibly the police, and demonstrate that visits to these sites were carried out for child protection purposes. The file should be retained by the group for evidence and reference purposes.
15 E-Safety Ref. ICT2 Page 14 of 15 Incidents of misuse involving students will be dealt with in accordance with the Federation Student Behaviour and Discipline Policy. 10 Procedures This procedure may only be amended or withdrawn by The Priory Federation.
16 E-Safety Ref. ICT2 Page 15 of 15 The Priory Federation of E-Safety Policy This Policy has been approved by the Education and Standards Committee. Signed Name... Date: Trustee Signed Name... Date: Chief Executive Officer Signed Name... Date: Designated Member of Staff Please note that a signed copy of this agreement is available via Human Resources.
Introduction This e-safety policy was approved by the School Senior Leadership Team: January2015 The implementation of this e-safety policy will be monitored by the: E-Safety Coordinator, Senior Leadership
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
E-Safety Policy Reviewed by E-safety Group 16 th January 2015 Reviewed by Governors 11 th Feb 2015 Review Date Feb 2016 Development / Monitoring / Review of this Policy This E-Safety policy has been developed
John of Rolleston Primary School E-Safety Policy February 2014 Contents 1 Introduction... 2 2 Aims... 2 3 Roles and Responsibilities... 2 3.1 Governors... 2 3.2 The Headteacher... 2 3.3 The Senior Leadership
E-Safety Policy Development / Monitoring / Review of the policy This policy applies to all members of the school (including staff, students / pupils, volunteers, parents / carers, visitors, community users)
e-safety Policy Broadclyst Community Primary School Revised: October 2011 This e-safety policy was approved by the Governing Body / Governors Sub Committee on: The implementation of this e-safety policy
E-Safety Policy & Procedures Version Policy Originator: Equality Impact Assessed: Approved by: SMT Date Approved: April 2015 Review Interval: Annually Last Review Date: - Next Review Date: April 2016 Audience:
The Kingswinford School - a science college E-SAFETY POLICY December 2014 Page 1 E-Safety Policy - Advice and Guidance Setting This guidance applies to all members of the school community (including staff,
Penrice Academy E-SAFETY POLICY Adopted by the Governing Body on June 2013 Review date: June 2015 Scope of the Policy This policy applies to all members of the College community (including staff, students,
E Safety Policy 1.0 Background New technologies have become integral to the lives of children and young people in today s society, both within the UTC and in their lives outside the UTC. The internet and
E-Safety Policy Last reviewed 2012 Updated October 2014 Background / Rationale New technologies have become integral to the lives of children and young people in today s society, both within schools and
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety
SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL E SAFETY Policy October 2012 Page 1 Saltford C of E Primary School E-Safety Policy Oct 2012 Table of Contents BACKGROUND / RATIONALE... 3 DEVELOPMENT / MONITORING
Category Security Document Name e-safety Procedures Accountable Body Brantridge School Governing Body Reference SY.P2.02 Date Ratified Version 2.1 Last Update March 2015 Related Policies & Documents Document
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education
Chailey Heritage Foundation encompasses; Chailey Heritage School Chailey Heritage Residential Futures@Chailey Heritage Simon Yates Richard Green Lyn Henwood Tyrone da Silva Denise Banks Rob Taylor Headteacher
Wilsthorpe Community School Online Safety Policy REVIEWED March 2016 Introduction This Online Safety Policy has been written by the school, building on LA policy and government guidance. It has been agreed
Cardinal Heenan Catholic High School E-Safety policy Approved by Full Governing Body: July 2015 Reviewed: Jul 2015 Signature (Chair of Governors): Next Review Date: Summer 2017 Key people in school Deputy
SERVICE CHILDREN S EDUCATION POLICY E-Safety Issued November 2011 New technologies have become integral to the lives of children and young people in today s society, both within schools and in their lives
Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: email@example.com
South West Grid for Learning Trust Ltd, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS Registered in England and Wales, Company Number 5589479. Charity Number 1120354. VAT Reg. Number 880
SUTTON COLDFIELD GRAMMAR SCHOOL FOR GIRLS E SAFETY AND SECURITY POLICY 1 DATE: MARCH 2015 REVISION DATE: MARCH 2017 Background / rationale New technologies have become integral to the lives of children
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
King David Primary School Staff Social Networking Policy This policy should be read in conjunction with other relevant policies e.g. school ICT Policy including acceptable or unacceptable usage, Disciplinary
E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour
Berwick Academy Policy on E Safety Overview The purpose of this document is to describe the rules and guidance associated with E Safety and the procedures to be followed in the event of an E Safety incident
360 Degree Safe Cymru SELF REVIEW TOOL UPDATED OCTOBER 2014 The South West Grid for Learning Trust, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0845 601 3203 Email: firstname.lastname@example.org
Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools
Witton Middle School e-safety Policy This e-safety Policy has been put together using guidance from the Worcestershire Local Authority (LA) and is based on the guidance provided by Becta. Our Vision Witton
E-Safety Policy Reviewed and Adopted: July 2014 Reviewed by: HT/ LTS Next Review: July 2015 Annual Policy 1 1. Introduction Internet is an essential element of life in 21st Century; it is also a part of
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
[Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy
Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful
Category Document Name Accountable Body Security E-Safety Policy RADIUS Trust Reference SY.P2 Date Ratified 11 th December 2014 Version 3.1 Last Update 31 st March 2015 Related Documents Document Protocol
Approved by Governing Body School Technical Security Policy January 2015 Signed (Chair) E-Safety Governor Dave Black Mark Staker Next Review January 2016 1 School Technical Security Policy Template (including
Great Horwood C.E. Combined School E-Safety/ ICT Acceptable Use Policy November 2013 This policy was adopted on:... Date of last review:... Signed:... Great Horwood C.E. Combined School Page 1 Acceptable
St. John the Baptist Catholic Primary School E-Safety Policy Prepared by: Tom Ferguson Created: February 2012 Date of next intended review: February 2013 Approved by Full Governing Body on: MISSION STATEMENT
FREDERICK BREMER SCHOOL E SAFETY POLICY 2015-6 Date of Issue: June 2015 Ratified: For review: Index Contents Page Number Introduction 3 Aim of the policy 3 Roles and Responsibilities 4 Frederick Bremer
Bennerley Fields School Technical Security Policy (including filtering and passwords) Agreed by Computing and e-safety Committee on: 11 th Dec 2014 Approved by Governors on:16 th December 2014 Introduction
Policy Document Information and Communication Technology and E-Safety Acceptable Use Policy Mission Statement The school is committed to the use of ICT across the curriculum and to providing all students
Havelock Academy Broadening Horizons Acceptable use of IT, e-safety and BYOD September 2014 M Trussell Director of IT September 2014 Purpose The purpose of this Acceptable Use of IT Policy (referred to
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
Our Lady of Lourdes and St Patrick s Catholic Primary Schools Huddersfield Electronic Communications Guidance for School Staff 2013/2014 Updated September 2013 Contents 1. Introduction 2. Safe and responsible
SCHOOL E-SAFETY SELF REVIEW TOOL The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, Devon, UK, EX2 5WS. Tel: 0845 601 3203 Fax: 01392 366 494 Email: email@example.com
Internet Acceptance Use and Data Security Policy Last Updated: 08/10/2012 Date of Next Review: 08/10/2015 Approved by GB: 10/10/2012 Responsible Committee: Student Welfare and Development Internet Acceptable
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY INTRODUCTION This document sets out the policy of WELB Youth Service in relation to the use of the computer and Internet facilities within
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
E-Safety Policy (Parent/Pupil) March 2013 1 ICT, Internet, Intranet and E-Mail Policy (Parent/Pupil) 1. Policy statement The purpose of this document is to set out detailed guidance for parents of pupils
STEP Academy Trust E-Safety and Data Security Policy Date of Policy: July 2015 Review: July 2018 Contents Introduction Computer viruses Data security E-safety in the curriculum Managing the internet Mobile
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB on: Reviewed policy shared with staff on: Policy to be reviewed again on: Committee responsible for review: Acceptable Use
St Vincent s Catholic Primary School e-safety Policy Policy e-safety Policy Date January 2015 Date of review January 2016 Signed Chair of Governors Signed Headteacher Effective Practice in e-safety E-safety
Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for
Date March 2016 Review Date 2018-2019 Internet, E-Safety & Acceptable Use Policy The Internet is becoming as commonplace as the telephone or TV and its effective use is an essential life-skill. Unmediated
Oratory R.C. Primary and Nursery School Shine as to be a light to others E-SAFETY POLICY Reviewed by Safeguarding, Health and Safety and Premises Committee: 1.10.14 Approved by the Governing Body: 15.10.14
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Bring Your Own Device Policy 1. Introduction The Foundation is committed to providing a technology based learning environment that creates opportunities to support and extend learning and teaching in all
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
Charles Williams Church in Wales Primary School Bullying Prevention Policy June 2014 Review date June 2016 This Bullying Prevention Policy acknowledges the Welsh Government s Respecting Others: Anti- Bullying
E-SAFETY POLICY Signed. for school Signed for Governors Date.. RATIONALE E-safety encompasses Internet technologies and electronic communications such as mobile phones as well as collaboration tools and
School Information Security Policy Created By: Newport Education Service Date Created: 22 December 2009 Version: V1.0 Contents Background... 3 IT Infrastructure... 3 IT Access... 3 Acceptable use policy...
Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible
Acceptable Use Policy (AUP) School Computing Approved by the Governing Body on Spring 2015 Review Date Spring 2018 Headteacher: Mr Ian Holmes BSc. (Hons) NPQH HOLBROOK PRIMARY SCHOOL Holbrook School Lane,
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8 Introduction The IT systems must be used in a reasonable manner and in such a way that does not affect their efficient operation,
Students KS2-3 Acceptable Use Policy Page 1 of 5 LITTLEGREEN SCHOOL Student Acceptable Use Policy Pupil access to the school network and Moodle is a privilege, not a right. All pupils must follow the conditions
Social Networking Procedure Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out Wiltshire Safeguarding Children Board s policy on social networking. This document aims to: Assist adults working
Contents (If you are viewing this document online, click on the headings below to jump to the relevant section) 1. Introduction... 1 2. Internet use... 2 3. Email use... 2 4. Data protection, freedom of
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
Ivy Road Primary School Policy for e-safety Updated - 2014 1. Introduction Pupils interact with the internet and other communications technologies such as mobile phones on a daily basis. The exchange of
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
Acceptable Use of Internet and Digital Technology Reviewed policy agreed by GB: Autumn 2015 Reviewed policy shared with staff: Autumn 2015 Policy to be reviewed again: Autumn 2016 Committee responsible
Page 1 of 7 Alveston CofE Primary School has adopted this policy from the Local Authority. INTRODUCTION Social media includes online social forums such as Facebook, Twitter and LinkedIn, and websites such
Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:
Internet Use and E-safety Policy Date Policy due to be reviewed: July 2016 Committee Responsible for Policy: Full Governing Body Committee Internet use and E-safety Policy 2015-16 Page 1 of 11 Internet
2010-2011 Computer and Internet Use Policy For Staff and Students General Computer and Network Use Pride Academy believes that the use of technology and computer-assisted communications is vital to our
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the