E-Safety Wiki e-Responsibility / Infrastructure and Technology - strategic considerations
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Infrastructure and Technology - strategic considerations

This version was saved 13 years ago View current version     Page history
Saved by Joan Walker
on March 22, 2011 at 1:29:49 pm
 

 

an image of the back of a PC with a network cable protrudingSecuring the network, and personal and sensitive data without locking down.


 

Poor E-Safety poses a real risk to the reputation of an organisation, and the first response is often locking down the network to avoid this. Technology has a lot to offer learners, e-Learning; its flexibility, availability and portability contributes to the personalisation of their learning and supports their engagement and acheivement. It also has a lot to offer providers in terms of meeting their obligations to deliver learning equitably and to exactingstandards within ever more challenging financial constraints.


 

When designing an e-safety policy it is important that the purpose of the policy is not to barr people technologically from accessing content (even though that might be needed to block certain known websites and Janet Internet Filtering is one of the many solutions) but to educate the learners to keep themselves safe online. As evident from UKERNA's submission to the House of Lords Select Committee on Science and Technology (sub-committee) on Investigation into Personal Internet Safety.


 

The new Ofsted Inspection regime for FEOfsted Safeguarding agenda and the safeguarding criteria can be accessed from the Excellence Gateway website.


While designing e-safety policy in regards to the Technology & Infrastructure side the institutional legal obligations needs to be covered.g it may be necessary to monitor the network for potential cases of cyber bullying or for behaviours where there are legal ramifications. JISC Legal has pblished the following papers on:

 

 

IT Law for FE and HE Senior Management (01/11/2005) , 

 

Monitoring Internet Use (12/12/2003) & 

 

Legal Risks and Liabilities for IT Services in FE and HE (01/09/2003) 

 

There is a themed section on the JISC Legal webite which includes more advice.
JISC Legal e-safety Policy Template also offers a starting point if you are looking to develop a strategy.

 

 

 

click here to go to Operations Considerations