The South Yorkshire County Trading Administration Safety Project



Similar documents
RIPA (Regulations and Investigatory Powers Act)

U 16 Internet Monitoring Policy & Investigation Protocol

How To Deal With Abuse In A School

How To Deal With An Allegation Of Sexual Abuse In A School

Model procedure for schools responding to allegations of abuse by teachers and other school staff. September 2011 Schools HR Consultancy

NATIONAL JOINT COUNCIL FOR STAFF IN SIXTH FORM COLLEGES

Responding to, Recording and Reporting Concerns Which Might Arise Within or Outside the Club

Berwick Academy Policy on E Safety

How To Protect School Data From Harm

Witton Middle School

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

St Vincent s Catholic Primary School e-safety Policy

John of Rolleston Primary School

This procedure applies where formal disciplinary action is commenced on or after 11 December 2013

Employment Policies, Procedures & Guidelines for Schools

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

E-Safety Policy and Regulations at School

Employment Policies, Procedures & Guidelines for Schools

E- Safety and Digital Photography - College ICT

Guidance on Bring Your Own Device (BYOD) Policy for Staff, Pupils and Visitors

Oratory R.C. Primary and Nursery School. Shine as to be a light to others E-SAFETY POLICY

Records Retention and Disposal Schedule. Information Management

Safeguarding children online

University of Sunderland Business Assurance Information Security Policy

E-Safety Policy. Please read this policy in conjunction with the policies listed below:

King David Primary School Staff Social Networking Policy

Social Networking Policy

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.

SALTFORD CHURCH OF ENGLAND PRIMARY SCHOOL

P319 Internet (including social networking) and usage in schools and academies Model policy

Networking and Social Media Policy

GREAT WALTHAM C of E PRIMARY SCHOOL

St Bernadette s Catholic Primary School. E-Safety Policy

School Child Protection & Safeguarding Policy 2014/2015

Roskear Primary & Nursery School. E-Safety Policy

Acceptable Use of Internet and Digital Technology

360 Degree Safe Cymru SELF REVIEW TOOL

E-SAFETY POLICY. The Kingswinford School - a science college. December Every Child a Scientist. Page 1

Dealing with Allegations of Abuse Against Staff in Schools. Practice Guidance

School Discipline - Standard of Procedure

DISCIPLINARY POLICY & PROCEDURE FOR SCHOOL BASED STAFF

Data Breach Management Policy and Procedures for Education and Training Boards

1. Owner Manager, Business Operations 2. Compliance is required by Staff, contractors, consultants and volunteers 3. Approved by The Commissioner

St Edward s Church of England Academy. E-Safety Policy

Information governance guidance for schools

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

POLICIES AND PROCEDURES DISCIPLINARY POLICY

Wilsthorpe Community School

E-Safety Policy Last reviewed 2012 Updated October 2014

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

Staff Investigation Protocol

Access Control and Account Management Policy Version May 2015

Caedmon College Whitby

ACCEPTABLE USE POLICY BE SAFE USING THE COMPUTER

Protocol for Acceptable Use of Internet and by Staff E-Safety Procedures Safeguarding & Child Protection Policy

How To Get A Credit Card From Dsostingprotection

PROCEDURE Police Staff Discipline. Number: C 0901 Date Published: 9 May 2013

TERMS AND CONDITIONS OF SERVICE

CONTENTS. Introduction Page 2. Scope.Page 2. Policy Statements Pages 2-3. Major IT Security Incidents Defined... Page 3

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)

Bring Your Own Device (BYOD) for Staff and Visitors

CHILD PROTECTION POLICY. City of London School (CLS) City of London School for Girls (CLSG) City of London Freemen's School (CLFS)}

E-Safety and Acceptable Use Policy

Thinking Schools Academy Trust

Disciplinary and dismissal procedures for school staff

Bring Your Own Device 2015 Parent information evening

September A Anti Bullying (Cyber Bullying) version 9

Social Network Protocol & Policy

Boothville Primary School. Dealing with Allegations against School Personnel, Volunteers, Headteacher or Pupils. Allegations

E-SAFETY POLICY. Signed. for school. Signed for Governors. Date..

E-Safety Policy. The following section outlines the e-safety roles and responsibilities of individuals and group within the school.

Information Systems (IS) Visiting Worker Information Security Policy

Terms of Service Disclosure to Law Enforcement: Service Rates: Payment: Payments and Fees:

Disciplinary Policy, Procedure and Rules

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Social Networking Policy

POLICY FOR DISSEMINATION FRONT SHEET

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Cork ETB Data Breach Management Policy and Procedures

Electronic Communications Guidance for School Staff 2013/2014

e-safety Policy for Hertsmere Jewish Primary School

Safeguarding / Child Protection Policy

BANK VIEW HIGH SCHOOL

How To Deal With Social Media At Larks Hill J & I School

Coláiste Pobail Bheanntraí

Membership Application OTASA Scheme of Co-operation

STAFF & GOVERNOR USE OF SOCIAL MEDIA AND INTERNET SITES POLICY

Disciplinary policy INTRODUCTION

Wakefield and District Safeguarding Children Board. Safeguarding Training for Schools. Guidance Document

Disciplinary Procedure

Work placement students undertaking work placement over a long period of time (one or two days per week over a period of two months or more)

E-Safety Policy & Procedures

Related Policies & Documents. Reference Material. 1. Introduction. 2. Roles & Responsibilities

SOCIAL NETWORKING POLICY

ONE TO ONE LAPTOP PROGRAMME POLICY

Havelock Academy Broadening Horizons

E Safety Policy. 6 th March Annually. 26 th February 2014

Bring Your Own Device Policy

SCHOOLS FRAUD RESPONSE PLAN

Processes for Managing Adult Membership in Girlguiding. Guidance notes for Commissioners

Transcription:

1 Purpose 1.1 The purpose of this procedure is to outline how settings where children and young people have access to the internet and other forms of technology should respond when there are breaches of esafety Policies including the Information Security and Computer Usage Policy and Protocols, and the ebehaviour Agreements, and where inappropriate materials are accessed. 2 Scope 2.1 This policy applies to staff, volunteers and young people in any settings who may have breached esafety Policies. 2.2 The policy also applies to a number of settings including schools, residential homes, libraries and other settings where young people have access to the Internet and other digital technologies. 3 References 3.1 The BECTA FITS framework and ITIL Incident Management process guidance has been consulted. 4 Definitions 4.1 Line : the most senior person in the agency responsible for safeguarding issues. Action to be taken when the breach is made by a member of staff Person Responsible

5.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been accessed the person who is made aware of this will report this to the agencies designated lead for esafety/safe guarding 5.2 The designated lead in the agency will conduct an initial fact finding investigation which will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 5.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 5.4 The head teacher/line manager will have been informed and should be given the results of the initial fact finding investigation 5.5 The head teacher/line manager will discuss the concerns with the Local Authority Designated Officer (LADO) in order to discuss whether there is a need for a Strategy Meeting. During this discussion consideration will be given as to whether the police need to be involved. The head teacher/line manager will also discuss with their HR advisers if the member of staff needs to be suspended or undertake different duties pending the completion of the enquiries. 5.6 The line manager/head teacher will also discuss the incident with the esafety lead in the Local Authority as consideration will need to be given to any further actions required. 5.7 Discussions will also need to take place between the local authority esafety lead and Strategic ICT lead to agree if the site(s) are blocked for the duration of the investigations. 5.8 The strategy meeting process will be completed following the South Yorkshire Child Protection Appendix 4 Allegations Against Staff Protocol www.safeguardingchildrenbarnsley.gov.uk Member of Staff aware of the incident esafety Lead 5.9 The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Action to be taken when a young person has been accessing inappropriate sites 6.1 Where there is concern that there has been a breach of the esafety Policies and inappropriate sites have been access the person who is made aware of this will report this to the agencies designated lead for esafety/child protection 6.2 The designated lead in the agency will conduct an initial fact finding investigation who will ascertain who was involved, what sites have been accessed. The laptop/computer will be withdrawn immediately and placed in a safe and secure place 6.3 The designated lead will classify the incident appropriately (high or low severity) and enter details of the incident into the agencies incident log 6.4 The head teacher/line manager will have been informed and should then be given the results of the initial fact finding investigation Person Responsible Member of Staff aware of the incident Teacher/

6.5 The head teacher/line manager will discuss the concerns with the manager of the Assessment Team in their area to establish if there are child protection concerns requiring a Section 47 Child Protection investigation. If this is required the Assessment Team will conduct this investigation as required within the South Yorkshire Child Protection Procedures 6.6 If there is no child protection investigation a decision will be made between the head teacher/line manager and the duty social worker as to whether additional work will be completed with the young person and their family via an Initial Assessment or the Common Assessment Framework. This process will ensure that parents are fully aware of the concerns/incidents and they will be given advice and information about managing the internet, use of parental controls etc. 6.7 At the time that the incident is reported the computer/laptop will be removed. The esafety lead in the agency will ask BULL IT / the brokered IT supplier to investigate what has been accessed on the hard drive and will be asked to complete a report detailing the usage. This report will be made available to the agency, Strategic ICT and the lead for esafety in the authority. This report will be required to inform the investigations. Assistant Team Assessment Team esafety Lead/BULL IT/Brokered IT Supplier 6.8 The management of esafety within the agency will also need to be considered including any recommendations for additional training 6.9 After the completion of all investigations the head teacher/line manager will need to provide a report to the Local Authority lead/strategic ICT to outline the outcome of the work undertaken, updated risk assessments relating to the management of access to computers any identified training needs. 6.10 Discussions will take place based on the information available to decide whether it is appropriate for the site(s) to be unblocked and Strategic ICT will arrange the unblocking of the site and the notification to the agency/other agencies who also need access to the site. 6.11 The designated lead will complete the agencies incident log and send a copy to the Local Authority s esafety lead Strategic ICT esafety lead

Appendix 1: Flow chart showing the processes to be followed when breach of esafety Policy is made by a member of staff: Breach of esafety Policies Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Member of Staff accessing inappropriate sites Inform head teacher/line manager teacher/line manager discusses with LADO HR Police Discussion esafety lead LA blocking of site Strategy Meeting Needed Able to Continue in Employment Criminal Matter Yes/No esafety lead discusses with SICT lead Strategy Meeting Site Blocked Pending Completion of Investigation No further action teacher/line manager discuss with member of staff e-safety breach, ensure any training offered refresh of policies and procedures by member of staff Breach of the policy confirmed Police Involvement Discussion with e-safety leads re. unblocking of the site subject to internal actions completed Appendix 2: Suspension management investigation by employer Breach of esafety AUP Complete incident log & send to LA

Flow chart showing the processes to be followed when breach of esafety Policy is made by a young person: Member of Staff Aware Designated esafety child protection lead Enter incident onto incident log Initial Investigation - incident classification Young Person Inform head teacher/line manager Discussion with Assessment Team Discussion esafety lead in LA re. blocking of site S47 Investigation No S47 esafety lead discusses with SICT lead No Further Action Discuss and agree if work undertaken via CAF/Initial Assessment Site Blocked Pending Completion of Investigation Child Protection Conference Child Protection Plan for Child Agree with agency any additional work Complete incident log & send to LA