Candidate Submission Contd.Module: EPICT Module P – ESafety Awareness
© EPICT UK, Glasgow & Warrington
Copyright in the whole and every part of this Courseware whether in the form of a written manual, document, software program, service or otherwise belongs to EPICT UK (“the owner”) and may not be used, sold licensed, transferred, copied or reproduced in whole or in part in any manner or form or in or on any media to any person other than in accordance with the terms of the Owner’s Licence Agreement without the prior written consent of the Owner.
All use of this material is governed by the Standard Licence Agreement together with the appropriate schedule. The following are available:-
An EPICT Centre Licence enabling not-for-profit use for the purposes of internal staff development by registered Centres.
An EPICT Partner Licence to cover all use including external provision to organisation clients by a registered EPICT Partner.
Contact Information:-
EnglandWalesScotland & NI
Dallam CourtHillington Centre
Dallam Lane1 Ainslie Road
WarringtonHillington
CheshireGlasgow
WA2 7LTG52 4RU
T: 01925 425 944T. 0141 585 6379
Email:
Candidate Submission Form
Module P – ESafety Awareness
FACILITATOR:confidential / SUBMISSION DATE: 21/10/2010
School/college/organisation:
MODERATOR: / DATE:21/10/2010
SUBMISSION OVERVIEW
The Candidate Submission Form:
The use of this Candidate Submission Form, although recommended, is optional and evidence can be presented to your Facilitator in a variety of forms. Your attention is drawn to the Assignment Requirements document provided by your Facilitator.
Submission Length:
The typewritten submission (excluding appendices) should be between 750 and 1000 words in length.
Types of evidence:
In addition to the plan, supplementary evidence may include the following:
Presentation Material or ‘Screen shots’
Teaching Materials
Transcripts (verbal, audio, visual) of the learning scenario
Observation Statements from Facilitator/s
Post implementation reviews including feedback from stakeholders
School ESafety Documentation
Action Plans
School Improvement Documentation
Operational Plans
comments:The ESafety Awareness episode must be capable of producing sufficient breadth and depth of evidence with measurable results which the participant is able to document. Support is provided by your EPICT facilitator, your study group and the EPICT forums.
TASK / You are required to choose one scenario from the following list:-TICK BELOW
a)Delivery of a standard curriculum based lesson or series of lessons incorporating online technology and embedding esafety practice
b)Dedicated E-Safety Awareness Session with Pupils /
c)Staff Development Session on esafety awareness, E-Safeguarding and school practice
d)Parents Session on E-Safeguarding – Includes awareness raising and school and home practice advice
e)Governors/External Stakeholder Session on E-Safeguarding – Includes awareness raising and school and home practice advice
f)Production of School reference and/or regulatory documentation in the area of esafety for a defined audience, addressing potential threats and advising appropriate technology use.
SECTION ONE / PLEASE PROVIDE A scenario plan/background document WHICH includES a brief description of THE FOLLOWING AREAS .
This part‘sets the scene’for your Facilitator and starts your planning process. / EVIDENCE provided / criteria achieved
a)the learner cohort / /
b)the objectives of the learning episode / /
c)staff involved, i.e. tutor, trainer, learning assistant, etc. / /
d)the resources available to support delivery, e.g. physical, technical, ICT and reasons for selecting specific resources where appropriate / /
The Learner Cohort
Pupils at primary school age, ranging from 4-10. We will be attending 8 different primary schools with different catchment areas, in the local area.
The Objectives of the Learning Episode
- To explain the dangers of using the internet
- To explain what cyber bullying is- different methods
- To educate pupils in ways of avoiding danger when using the internet
- To encourage pupils to avoid partaking in cyber bullying or dangerous usage of the internet using different learning techniques
- To educate the pupils in the concept of Zip it, Block it, Flag it.
Myself and safety colleague (name given)
The Resources Available
Usually we have access to a computer, projector and screen. We use a PowerPoint presentation produced by myself, colleague and 6th Form Students.
If necessary, please continue on a separate sheet
SECTION TWO - EXPLANATORY REPORT
Participants are asked to demonstrate their applied knowledge and skills, within the context of their task and addressing the performance criteria below:-
OUTCOME 1 / The identification and understanding of potential esafety threats to children and young peopleWithin the context of the chosen task, you must: / EVIDENCE provided / criteria achieved
- Identify and document all relevant esafety risk areas
- Describe potential esafety threats (to children/young people and staff)
- Identify and document all relevant esafety risk areas
- Accessing inappropriate materials.
- Cyber bullying (be it through text message, social networking sites, email etc)
- Staying safe on the internet (stranger danger- avoiding giving any personal information etc)
- Zip it, Block it, Flag it
- Describe potential esafety threats (to children/young people and staff)
- Pupils can experience emotional damage from cyber bullying. Pupils have access to email within the school environment that can cause possible risks such as cyber bullying. Pupils can openly email each other and are at risk that people can send them inappropriate messages, inappropriate files (images, etc) and possibly send malicious files (Viruses, spyware).
- The Internet offers many positive educational and social benefits to young people, but unfortunately there are risks too. As in any other area of life, children and young people are vulnerable and may expose themselves to danger, knowingly or unknowingly, when using the internet and other digital technologies. Indeed, some young people may find themselves involved in activities which are inappropriate or possibly illegal.
- Inappropriate Material
- Physical Danger
- Illegal Behaviour
- Divulging Personal Information
OUTCOME 2 / A description of safety precautions undertaken and/or recommended when supervising students online
Detail appropriate action taken to limit esafety risks: / EVIDENCE provided / criteria achieved
- Reasonable safety precautions identified and implemented
- Request for additional support where necessary
- Reasonable safety precautions identified and implemented
The school filtering system is in place to reduce the chances of pupils accessing websites that are seen as offensive/inappropriate. Although the system is not 100%, it greatly reduces the chances of pupils being able to access unnecessary content. The system is regularly updated and if websites are found that need to be filtered, this can be done with immediate effect.
School policies and agreements (Communications and acceptable use policy (staff), Internet use pupil guidelines policy (students)).
For the pupils at the school to be given access to the school network, both pupils and parents have to sign an agreement to ensure that they will not use the system inappropriately. This includes both using the intranet and internet.
Also each time a pupil logs into the system they have to agree to a network policy otherwise the system will not let them in. Pupils who fail to follow the agreement are removed from the school system until SLT has made a decision on how to deal with the case on merit.
Pupil Education
Pupils are taught about:
- The school filter, what it is and what do if it is displayed on your machine.
- Inappropriate material, what to do if you find or see anyone on inappropriate material on the internet (within school).
- Virus message, what do you if a virus message pops up.
- Request for additional support where necessary
Technical support is available throughout the working day from our dedicated technicians. Any problems with pupils accessing inappropriate materials can be dealt with almost immediately as the network administrators have access to complete many tasks including:
- Banning websites.
- Locking students accounts.
- Monitoring the school web log, that will see exactly what each pupil has accessed in a given time.
- Removing internet privileges.
The school has a CEOP trained member of staff that can be used in any event required. This person knows the correct procedure to deal with any risk whilst using technology.
If necessary, please continue on a separate sheet
OUTCOME 3 / Evidence of knowledge relating to safeguarding requirements, guidance, systems and processes
Within the context of the chosen task, Participants are required to display knowledge of the following:-
- Systems which inform, guide and support education professionals in the areas of e-safeguarding and the promotion of student well-being online
- Systems which enable reporting and offer assistance with esafety breaches and incidents at:-
- School
- Local area
- National area
Therefore, evidence should be generated to fulfil the following performance criteria: / EVIDENCE provided / criteria achieved
- knowledge of recommended sources of esafety guidance and best practice.
- An up to date knowledge of their own organisation’s official reporting and support procedures.
- Awareness of sources of supplementary expertise and assistance at school, local and national levels
School Systems
Within school there is various to support for staff and students that promote e-safeguarding.
School Policies
There are currently 2 school policies that are connected with this scenario:
- Communications and acceptable use policy (staff)
- Internet use pupil guidelines policy (students).
CEOP trained staff member
Within school we have a fully trained CEOP staff member that any e-safeguarding issues can be referred to. This person also trains staff and holds assemblies with students to ensure that they are educated on these threats.
Esafety Team
The school has created an Esafety team which holds the responsibility for ensuring that all staff, students, governors and parents have the correct information/training to ensure that they know the dangers of using communication technologies. This includes education on where to find assistance and information when incidents occur. The Esafety team is made up of 8 members of staff and 8 6th form students and each of these are currently undertaking the EPICT Esafety Awareness certificate.
Resources
The school has a bank of Esafety resources that are available to staff for their own professional development and for use within lessons.
Local Area systems
Internet Filter
The LA provides us with our internet filter, this restricts access to inappropriate materials on the web. This system is constantly updated to attempt to keep users as safe as possible. We also have access within school to add our own filters to the web via the technicians.
LA Esafety Project
Our school and our feeders schools are currently working together to address the needs for staff, students and parents in regards to Esafety. There has been on online questionnaire that has been filled out by various students, staff and parents. Once the data has been analysed and issues found, training and policies are going to be put in place.
CEOP Police officer
If an incident occurs with regards to ESafety, there is a local police officer that is dedicated to dealing with incidents. This person can be accessed through our own CEOP trained member of staff.
National Systems
Law
The students have been made aware of the law surrounding Esafety, especially in regards to cyber bullying. The students are aware that any incidents can be referred directly to the police or within school via our CEOP trained officer.
CEOP
Students and staff have been made aware of CEOP and how to use “Reporting abuse” buttons on web-based sites such as chat-rooms, social networking sites and interactive gaming sites. Within school the CEOP trained officer has any incidents referred to her.
Websites
There are many websites with up to date information and support with regards to safety. Within school we have a spreadsheet listing them so that if any incident occurs, we can use the available resources.
If necessary, please continue on a separate sheet
OUTCOME 4 / An evaluation of the session which includes reflection on the achievement of intended aims and conclusions and recommendations for future use.
EVIDENCE provided / criteria achieved
- Evaluation of the session
- Reflection on achievement of aims
- Conclusions and Recommendations for future use
Evaluation of the session
The session went extremely well and the students showed interest in the ideas we shared and they also seemed to understand the concepts. Students were given the information that they needed to know within safeguarding and because of this were able to access the information that they needed.
Some students had shown confusion over potential threat areas and appropriate behaviour online. Guidance was given and will continue to be a focus over the coming months.
Pupils enjoyed the active session, and all seemed to be keen to contribute. Most schools were welcoming and excited about the prospect of having an E-safety assembly.
All schools had had previous sessions in the classroom and most of the pupils were aware of the issues surrounding the internet. Most of the schools mentioned they had students who were using Facebook (even thought the legal age is 13 to start using it) and some even had issues with cyber bullying, so were very pleased with the things we covered.
Reflection on achievement of aims
We presented the concepts clearly and through different means, talking, acting, interactive tasks and a short film. Thus appealing to the different learning techniques.
By sticking to our plan we covered Zip it, Block it, Flag it, Cyber Bullying, and the dangers of the internet- and thus educated the pupils about each of these topics, and encouraged pupils to avoid this (I like to imagine that the person I love most in the world in watching me, and I would never want to let them down). Explaining that cyber bullying IS bullying and can be illegal. We did not want to upset the pupils too much with the dangers of the internet- but by having my colleague play a 10 year old girl on the internet we are able to show the dangers of lying on the internet through this form.
Conclusions and Recommendations for future use
Within a whole school situation, the schools have an excellent attitude towards Esafety and staff/students are constantly being updated on the latest issues. I recommend that the school continues this approach and strives towards being a EsafetyAwareSchool through its current Esafety team.
We will continue to visit local schools where needed, and we would be willing to present the assembly to the pupils at neighbouring schools.
If necessary, please continue on a separate sheet
© EPICT UKFor Centre Use Only[Candidate Submission - 1of 9– 2009]