E-Safety Wiki e-Responsibility / Infrastructure and Technology - strategic considerations
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.


Infrastructure and Technology - strategic considerations

Page history last edited by Julia Taylor 9 years, 7 months ago


an image of the back of a PC with a network cable protrudingSecuring both the network and its data without locking it down.


Poor e-safety poses a real risk to the reputation of an organisation, and while the first response is often to lock down the network, a more effective response would be to enable staff and learners to use the network in a responsibly. Technology has a lot to offer learners, e-learning; its flexibility, availability and portability contributes to the personalisation of their learning and supports their engagement and achievement. It also has a lot to offer providers in terms of meeting their obligations to deliver learning equitably and to exacting standards within ever more challenging financial constraints.


When designing an e-safety policy it is important that the purpose of the policy is not to bar people technologically from accessing content (even though that might be needed to block certain known websites and Janet Internet Filtering is one of the many solutions) but to educate the learners to keep themselves safe online. As evident from UKERNA's submission to the House of Lords Select Committee on Science and Technology (sub-committee) on Investigation into Personal Internet Safety.


The new Ofsted Inspection regime for FE Ofsted Safeguarding agenda and the safeguarding criteria can be accessed from the Excellence Gateway website.


While designing e-safety policy with regard to the Technology & Infrastructure side, the institutional legal obligations needs to be covered e.g. it may be necessary to monitor the network for potential cases of cyber bullying or for behaviours where there are legal ramifications.


Related Links


IT Law for FE and HE Senior Management (01/11/2005)


Monitoring Internet Use (12/12/2003)


Legal Risks and Liabilities for IT Services in FE and HE (01/09/2003)


JISC Legal e-safety Policy Template also offers a starting point if you are looking to develop a strategy.


Protecting Personal Data  BSI Data Protection Compliance and British Computer Society Personal Data Code