E-Safety Wiki e-Responsibility / Strategic Considerations
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.

View
 

Strategic Considerations

Page history last edited by Julia Taylor 8 years ago

 

an image of a maze with a route thorugh it marked out in blue Although we have divided them into strategic and operational, e-safety considerations inevitably overlap and impact on different roles within different provider organisations in this diverse sector. The resources have been tagged to a range of themes to make them easy to find. 

 

It is helpful to have a framework to structure any policy. The Becta's PIES model is an effective framework for approaching a safeguarding strategy across a range of learning provision. More information is available on the Excellence Gateway. PIES uses the following categories to approach all the areas and activities on which e-safety will impinge:

 

  • Policy and Practice

  • Infrastructure and Technology

  • Education and Training

  • Standards and Inspection

 

The PIES model offers a simple way of mitigating against risks through a combination of effective policies and practice, a robust and secure technology infrastructure, and education and training for learners and employees alike. The model helps organisations develop e-safety within a safeguarding strategy, to ensure that they are:

 

  • providing a safe environment for all learners and employees

  • equipping learners and employees with the skills needed to mitigate against risks, understand dangers and

  • respond appropriately to incidents

  • adhering to legal responsibilities and protecting their reputation as a provider

  • ensuring that technologies are used responsibly in order to support innovative and effective learning and teaching.

 

Taking a Strategic Approach

Organisations should begin by assessing their current provision this will enable them to take a strategic approach. This assessment should be undertaken by a range of staff whose roles relect the organisations delivery and structure i.e. technical, curriculum and safeguarding.

 

1. A self-assessment process is a key part of implementation and proper risk assessment. This is central to identifying how to approach the e-safety process, and will also form the basis for inspection evidence. The following online tools have been designed to take you through the key elements you need to consider with e-safety and assess how you are doing as an organisation or department.


The SWGfL Online Compass  can be used to assess e-safety practice for most organisations including those outside of mainstream FE. More information for those managing the e-safety strategy.

 

Alternatively, the SWGfL 360 Degree tool is divided into 4 elements: Policy and Leadership, Infrastructure, Education and Standards and Inspection which mirror the PIES approach. Under these elements you assess your practice against 4 levels to get a 'grade'. Suggested improvements and sources of evidence of good practice are included in each section. The tool is linked to the EPICT e-safety module who offer a certificated award in e-safety. Also see the e-safety online planner 

 

 

2. Risk Assessment. As with Health, Safety and Safeguarding, e-safety risks need to be properly assessed. Organisations need evidence that they have carried out a realistic risk assessment based on their learners and their provision. Teachers should be encouraged to assess and address the risks. As e-safety sits within Safeguarding the LSIS presentation on Safeguarding more generally from Phil Barnett may be useful. JISC InfoNet has an InfoKit on approaching risk management
The (NEN) National Education Network tool is a quick and easy indicator of e-safety practice which addresses different risks for different situations.

 

 

3. Integrated Policies based on relevant Legal Advice and Technical Expertise. JISC Legal also have a themed area of their website dedicated to e-safety which has lots of useful information covering e-safety with resources ranging from podcasts on the legal aspects of using images, to downloadable policy templates. There is also a checklist which can form the basis of an action plan. There is a legal section in this wiki resource where you will find a link to JISC Legal and JANET who provide the connectivity for FE and HE IT provision. They also provide advice on Acceptable Use of IT services and publications to support legal and technical compliance. 

 

4. Evidence for inspection and monitoring standards. Ofsted have issued guidance and examples of Best Practice in safeguarding which includes e-safety. Case studies and examples of best practice will be added to the Excellence Gateway. The standards and inspection sections of this resource include links to the EG and Ofsted resources and to the OfSted Quick Assessment tool.

 

 

 

Related links

 

PIES pdf document based on BECTA model (for printing)

 

NEN Audit Tool National Education Network e-safety audit.

 

SWGfL 360 Degree Tool South West Grid for Learning e-safety Self-evaluation Tool using the PIES model.

 

Northern Grid for Learning e-safety site includes an e-safeguarding audit tool. Risk assessment, data classification, access control and more.

 

JISC InfoNet Risk management InfoKit

 

Ofsted quick assessment tool kit

 

JISC Legal e-Safety section. As wellas an e-safety policy template, top tips and checklist, JISC Legal have advice, videos and webcasts on the use of child images, web2.0, podcasting and recording lectures and avoiding and reacting to cubercrime. There is also legal guidance on monitoring, access staff accounts, filtering, hosting and legal risks specific to FE and HE institutions operating and providing IT facilities.  

JANET Publications include a guidance on writing an AUP and factsheets on dealing with cybercrime.