SlideShare uma empresa Scribd logo
1 de 71
Baixar para ler offline
Being Brave Safely
     How well equipped are you and your
     school to avoid the potential risks of
     “bring your own devices”?

     Ron Richards
     E-Safety Consultant
     South West Grid for Learning




© South West Grid for Learning Trust
Overview
1990            1995         2000             2005            2010               2015


                BBS
Applications


Content


Communication


Collaboration


Entertainment


E-Commerce



 Bandwidth       9.6K     14.4K        56K   64K    128K          1Mb   6Mb   24Mb               ?


 HDD Storage     1GB      2GB          4GB    10GB         50GB      300GB    1TB    2TB         ?


 Internet Age   Web 1.0                                       Web 2.0                 Web 3.0?
© SWGfL Trust 2011
Go figure 3

Family Online Safety Institute
(FOSI)

 http://www.youtube.com/watch?v=hSQ6GcskLNg




© SWGfL Trust 2011
Research
© SWGfL Trust 2011
Trends in media use
Trends in media use
The Byron Report




Safer Children in a Digital World
Professor Tanya Byron
Byron Review
  Provide children’s workforce with skills and knowledge



  Deliver e-safety through the curriculum



  Reach children and families through extended schools



  Ensure OfSTED holds the system to account
Ofsted – The safe use of new technologies

  Active approach to e-safety
  Pupil knowledge and understanding
  Shared responsibility for e-safety
      Pupils in the schools that had ‘managed’ systems had
  Training – all staff /andGovernors
    better knowledge all understanding of how to stay safe
    than those in schools with ‘locked down’ systems. Pupils
  Well planned & coordinated curriculum
    were more vulnerable overall when schools used locked
  Policies adapted to circumstances not given enough
       down systems because they were
  Do not have “lock-down” filtering
   opportunities to learn how to assess and manage risk for
  Pupils take responsibility for own safety
                            themselves.
© SWGfL Trust 2011
© SWGfL Trust 2011
E-Safety in schools – “State of
    the Nation”
    Prof Andy Phippen
    andy.phippen@plymouth.ac.uk




© South West Grid for Learning Trust
3
                                         4




                                       2.2
                                       2.4
                                       2.6
                                       2.8
                                       3.2
                                       3.4
                                       3.8
                                       3.6
                            AUP
   Community understanding
     Digital and video images
               Email, chat, etc.
E-Safety Committee or Group
            E-safety education
     E-Safety Responsibilities
                       Filtering
             Governor training
                     Governors
          Information literacy
      Mobiles and handhelds
    Monitoring and reporting
           Monitoring Impact
           Parental education
                                                               Aspect averages




            Password security
                 Personal data
          Policy development
                  Policy Scope
       Professional standards
                      Reporting
                      Sanctions
                Self Evaluation
                  Staff training
             Technical Security
   The contribution of young…
                 Website, etc.
                 Whole School
                                       Year 2011
                                                   Year 2012


                           Year 2010
2010/2011 Comparison – Best
              Aspects
2010                 2011                2012
• Filtering (2.57)   • Filtering (2.5)   • Filtering (2.48)
• AUPs (2.78)        • Policy Scope      • Policy Scope
• Policy Scope         (2.65)              (2.58)
  (2.8)              • AUPs (2.71)       • AUP (2.71)
• Digital and        • Digital and       • Digital and
  video images         video images        video images
  (2.93)               (2.83)              (2.74)
• Policy             • Policy            • Policy
  development          development         development
  (3.02)               (2.88)              (2.8)
2010/2012 Comparison – Weakest
            Aspects
  2010                2011                  2012
• Community         • Community         •   Community
  understanding       understanding         understanding
  (4.03)              (4)                   (3.91)
• Governor          • Governor          •   Governor
  training (4.03)     training (3.93)       training (3.85)
• Monitoring the    • Monitoring the    •   Monitoring the
                      impact of the         impact of the
  impact of           e-safety policy       e-safety policy
  policy and          and practice          and practice
  practice (3.96)     (3.9)                 (3.85)
• E-Safety          • E-Safety          •   Staff training
  Committee           Committee             (3.73)
  (3.94)              (3.82)            •   E-Safety
• Staff training    • Staff training        Committee
  (3.84)              (3.76)                (3.67)
Improvement 2012
•   Mobiles and               •   Monitoring and
    handhelds (0.28)              reporting (-0.1)
•   Professional              •    AUP (0)
    standards (0.2)           •   Self Evaluation (0)
•   E-Safety                  •   The contribution of
    Responsibilities (0.14)       young people (0.01)
•   E-Safety Committee        •   Filtering (0.03)
    or Group (0.13)
•   Website, etc. (0.12)
0.5
                           2.5
                           3.5
                           4.5




                           1.5



                             0
                             2
                             3
                             4




                             1
                        AUPs
Community understanding
  Digital and video images
                  Email, etc.
    E-Safety Committee or…
         E-safety education
  E-Safety Responsibilities
                    Filtering
                                                                 Averages


          Governor training
                  Governors
       Information literacy
                    Mobiles
 Monitoring and Reporting
   Monitoring the impact
        Parental education
         Password security
              Personal data
       Policy development
               Policy Scope
   Professional Standards
                   Reporting
                   Sanctions
             Self Evaluation
               Staff training
          Technical Security
                                                                 Primaries vs Secondaries




The contribution of young…
     Website, VLE + public…
              Whole School
                           Primary Average
                                             Secondary Average
0
                                                                                                         1




                                                                                 0.2
                                                                                             0.6
                                                                                                   0.8
                                                                                                             1.2




                          -0.2
                                                                                       0.4
                        AUPs
Community understanding
  Digital and video images
                  Email, etc.
    E-Safety Committee or…
         E-safety education
  E-Safety Responsibilities
                    Filtering
          Governor training
                  Governors
       Information literacy
                    Mobiles
 Monitoring and Reporting
    Monitoring the impact
        Parental education
         Password security
              Personal data
       Policy development
               Policy Scope
    Professional Standards
                   Reporting
                   Sanctions
             Self Evaluation
               Staff training
          Technical Security
 The contribution of young…
     Website, VLE + public…
              Whole School
                                                                                                                   Getting closer and closer...




                           2010 Difference
                                             2011 Difference
                                                               2012 Difference
1.5
                                                               2.5
                                                                         3.5




                                           0.5
                                      0
                                                 1
                                                           2
                                                                     3
                                                                               4
             Acceptable Use Policies
                        Administrators
         Community Understanding
           Digital and Video Images
     Digital Citizenship for Students
                        Digital Literacy
                   Disciplinary Action
    Email, Chat, Social Networking,…
                  E-Safety Committee
            E-Safety Responsibilities
          Evaluate and Adjust Policy
      Evaluate and Assess Incidents
                                                                                   US Old Average




                               Filtering
       Mobile Phones and Personal…
                   Parental Education
                    Password Security
                         Personal Data
                  Policy Development
                          Policy Scope
         Professional Use Standards
                                                                                   Aus Old Average




                             Reporting
                        Self-Evaluation
                Student Contribution
                    Technical Security
         Training for Administrators
                                                                                   UK Average




                   Training for Faculty
       Training for Librarian/Media…
Training for Network Administrator
                                                                                                     International Comparisons




            Training for Safe Schools…
      Training for School Counselor
           Training for School Nurse
                      Training for Staff
         Website, Online Education,…
                         Whole School
Strategies and Solutions
Teach new media
                      literacy that
                    involves critical
                         thinking


 Bridge the gap
                                         Enable the safe
between formal
                                          use of mobile
  and informal
                                          technologies
    learning


                     How do
                    we begin
                   to change?
    Factor in                            Empower young
adolescent brain                        people to protect
development and                            themselves
 have a granular                        rather than being
 approach safety                        seen as potential
   education                                 victims

                   Promote ethic of
                     good online
                      citizenship
Rather than
                   locking down
                    the internet,
                  support its most
                   enriching uses




Ensure that ALL
  staff receive   How do we           Empower
                                       parents.
  regular and      begin to           Encourage
 relevant up to
      date         change?           engagement.




                    Widen the
                  participation of
                       more
                   professionals
                    beyond the
                     technical.
Online grooming
                                   Cyberbullying
                             Sexting
Identity theft
                       Online personal identity

        Online professional identity

           Geolocation based risks

                      Addiction and dependency
Personal data accountabilities
Are you ready?
Review – Element Level
Review – Strand Level
Review –
 Aspect
  Page
On the aspect pages
you will choose the
most suitable level
statement for your
school for that aspect
On each aspect page
    you choose the level
    statement that best fits
    your school.




This symbol shows the
“accreditation
benchmark level” for
the aspect


When you have chosen
your level it is
highlighted like this.




     Review – Aspect Page (top part)
Improvement action
                       changes as you change
                       your chosen level
                       statement

                       Possible sources of
                       evidence are
                       suggested

                       Clicking on these
                       links opens relevant
                       policy templates and
                       other guidance



                        Here you can add
                        free text in evidence,
                        action notes or
                        comments sections


Review – Aspect Page
    (bottom part)
Links to Resources




© SWGfL Trust 2011
Free Text Boxes / Collaboration




© SWGfL Trust 2011
Certificates / E-Safety Mark
Understand technical intervention
Understand technical intervention
Understand technical intervention
South West Grid for Learning



SWGfL Services - Filtering – Transparent Filtering Module                           How do I get it?
                                                                                    There’s no
What is it?                                                                         additional charge

• An enhancement to SafetyNet Plus that allows any device                           Visit ESI or email
  to use the service without needing any configuration                              sis@swgfl.org.uk for
                                                                                    details
Why have we done it?
• Growing use of ‘guest’ and ‘personal’ devices in schools
• Proxy is inconvenient and not always technically possible
• Traditional ‘transparent proxy’ is limited
• Our Solution (not transparent proxy):
    •   One solution for HTTP and HTTPS - inspects all HTTP traffic and can filter HTTP requests on non-
        standard ports (and can apply filtering to other protocols e.g. IM)
    •   No support for a proxy required and no client configuration required
    •   Works with existing systems - same admin interface and no change in policies or experience -
        completely transparent to the end user
    •   It doesn’t matter whether proxy is configured or not - users can transition when they want to
Amber lines
Content Filtering         indicate unfiltered
                         traffic from / to the
Transparent Services:                   client

                                   Green lines
                              indicate clean
                         traffic from / to the
                                        client

                          Red lines indicate
                        blocked traffic (the
                         connection control
                                  resets the
                        connection with the
                          client and server)

                            Brown lines are
                             control signals
Monitoring
Clear expectations; responsibility
Clear expectations; agreement
Clear expectations; sanctions
Clear expectations; reporting
Educate your workforce
Educate; parents
E-safety Curriculum




© South West Grid for Learning Trust
Mapping the curriculum
   • Where are e-safety topics covered?
   • Are topics duplicated?
   • Is the curriculum progressive – does each year
     build on the last?
   • Is there breadth? – not just safety and security, but
     digital literacy
   • Do the children contribute?
   • Who has the responsibility to map this provision?
         • E-Safety Lead?
         • E-Safety Committee?
         • ICT Lead?




© SWGfL Trust 2011
Digital Literacy




© SWGfL Trust 2011
© SWGfL Trust 2011
© SWGfL Trust 2011
Digital Literacy Curriculum




© SWGfL Trust 2011
© SWGfL Trust 2011
© SWGfL Trust 2011
© SWGfL Trust 2011
BYOD specific policies / practice
Cloudlearn Report
Sample BYOD AUP
Guidelines for use
· Use of personal devices during the school day is at the discretion of
teachers and staff. Students must use devices as directed by their
teacher.
·   The primary purpose of the use of personal devices at school is
educational. Personal use for personal reasons is secondary.
·     The use of a personal device is not to be a distraction in any way
to teachers or students. Personal devices must not disrupt class in any
way.
·     The use of personal devices falls under School Acceptable Use
Policy, found in the student handbook
·     Students will refrain from using personal devices outside of their
classroom unless otherwise directed by their teacher
·    Students shall make no attempts to circumvent the school’s
network security and/or filtering policies. This includes setting up proxies
and downloading programs to bypass security.
·    Students shall not distribute pictures or video of students or staff
without their permission (distribution can be as small as emailing/texting
to one other person or as large as posting image or video online)
Questions to address
•   Why are you doing it? – educational goals
•   Policy & buy-in
•   What devices / software will you allow?
•   Access to internet or network?
•   Technical Solutions – transparent filtering
•   IT Support?
•   Acceptable use policy / sanctions
•   Staff training
•   Education
•   Parental understanding
•   Equity issues?
Be brave - safely
• Start small – trial project
• Involve young people
• Expect that in the short term there may be more
  incidents eg cyberbullying – plan for and deal with
• Inspire cultural change
Ron Richards@swgfl.org.uk

Mais conteúdo relacionado

Destaque

Exploiting ICT to improve parental engagement, moving towards online reporting
Exploiting ICT to improve parental engagement, moving towards online reportingExploiting ICT to improve parental engagement, moving towards online reporting
Exploiting ICT to improve parental engagement, moving towards online reportingNaace Naace
 
Ict final powerpoint
Ict final powerpointIct final powerpoint
Ict final powerpointnicholas1976
 
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...Naace Naace
 
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...Naace Naace
 
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...Naace Naace
 
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...Naace Naace
 
Uc Ms Diploma
Uc Ms DiplomaUc Ms Diploma
Uc Ms Diplomamadanim
 
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...beatricemotamedi
 
News Gathering: Lies, damned lies, and surveys
News Gathering: Lies, damned lies, and surveysNews Gathering: Lies, damned lies, and surveys
News Gathering: Lies, damned lies, and surveysbeatricemotamedi
 
Naace think tank_slides
Naace think tank_slidesNaace think tank_slides
Naace think tank_slidesNaace Naace
 
Oxfam Launches East Africa Appeal for Starving People
Oxfam Launches East Africa Appeal for Starving PeopleOxfam Launches East Africa Appeal for Starving People
Oxfam Launches East Africa Appeal for Starving PeopleP6P
 

Destaque (20)

Exploiting ICT to improve parental engagement, moving towards online reporting
Exploiting ICT to improve parental engagement, moving towards online reportingExploiting ICT to improve parental engagement, moving towards online reporting
Exploiting ICT to improve parental engagement, moving towards online reporting
 
Ict final powerpoint
Ict final powerpointIct final powerpoint
Ict final powerpoint
 
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...
Exploiting ICT- making online reporting happen - Simon Thompson - Assistant H...
 
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...
Naace Conference 2103 - Disruptive Devices: new pedagogies for mobile technol...
 
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...
Naace Conference 2103 - Adapting to the needs of a new curriculum framework: ...
 
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...
Naace Conference 2103 - Beyond online safety to offline outcomes: using what ...
 
Uc Ms Diploma
Uc Ms DiplomaUc Ms Diploma
Uc Ms Diploma
 
Petlike
PetlikePetlike
Petlike
 
Raport de CSR al Holcim Romania 2007
Raport de CSR al Holcim Romania 2007Raport de CSR al Holcim Romania 2007
Raport de CSR al Holcim Romania 2007
 
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...
Pausd presentation february 2015 final (deleted e59b5d53e66c5b7ec2cf16f3dd8dd...
 
Ohigh garden slideshow
Ohigh garden slideshowOhigh garden slideshow
Ohigh garden slideshow
 
News Gathering: Lies, damned lies, and surveys
News Gathering: Lies, damned lies, and surveysNews Gathering: Lies, damned lies, and surveys
News Gathering: Lies, damned lies, and surveys
 
Naace think tank_slides
Naace think tank_slidesNaace think tank_slides
Naace think tank_slides
 
Ohigh garden slideshow
Ohigh garden slideshowOhigh garden slideshow
Ohigh garden slideshow
 
Oxfam Launches East Africa Appeal for Starving People
Oxfam Launches East Africa Appeal for Starving PeopleOxfam Launches East Africa Appeal for Starving People
Oxfam Launches East Africa Appeal for Starving People
 
Genetic drift
Genetic drift Genetic drift
Genetic drift
 
6. migration
6. migration6. migration
6. migration
 
Migration.ppt
Migration.ppt Migration.ppt
Migration.ppt
 
Migration models
Migration modelsMigration models
Migration models
 
Migration
MigrationMigration
Migration
 

Semelhante a Being Brave Safely: How Well Equipped Are Schools for BYOD Risks

ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2KnowledgeWorking
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality AssuranceAshley Tan
 
ICICTE2012 presentation
ICICTE2012 presentationICICTE2012 presentation
ICICTE2012 presentationJoão Piedade
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2Graeme Payne
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Collabor8now Ltd
 
Supporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler CardsSupporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler CardsChristian Glahn
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICTMark S. Steed
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.Lumension
 
Social media accessibility: where are we today?
Social media accessibility: where are we today?Social media accessibility: where are we today?
Social media accessibility: where are we today?AccessibilitéWeb
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015Minded Security
 
Big data and its impact on SOA
Big data and its impact on SOABig data and its impact on SOA
Big data and its impact on SOADemed L'Her
 

Semelhante a Being Brave Safely: How Well Equipped Are Schools for BYOD Risks (20)

ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2ISACA AsiaPac Conf 2008  Employee Info Sec Awareness via Web 2
ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
ICT Quality Assurance
ICT Quality AssuranceICT Quality Assurance
ICT Quality Assurance
 
ICICTE2012 presentation
ICICTE2012 presentationICICTE2012 presentation
ICICTE2012 presentation
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 
Supporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler CardsSupporting learner mobility with Mobler Cards
Supporting learner mobility with Mobler Cards
 
IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT120321 IAPS Some things Prep Heads need to know about ICT
120321 IAPS Some things Prep Heads need to know about ICT
 
Cases
CasesCases
Cases
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.How Mature is Your Data Protection? 3 Steps to Effective Data Security.
How Mature is Your Data Protection? 3 Steps to Effective Data Security.
 
Social media accessibility: where are we today?
Social media accessibility: where are we today?Social media accessibility: where are we today?
Social media accessibility: where are we today?
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
 
Agama Profile
Agama ProfileAgama Profile
Agama Profile
 
Agam Profile
Agam ProfileAgam Profile
Agam Profile
 
Big data and its impact on SOA
Big data and its impact on SOABig data and its impact on SOA
Big data and its impact on SOA
 

Mais de Naace Naace

Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...
Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...
Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...Naace Naace
 
Naace Conference 2103 - Curricululm and Assessment - Jan Webb
Naace Conference 2103 - Curricululm and Assessment - Jan WebbNaace Conference 2103 - Curricululm and Assessment - Jan Webb
Naace Conference 2103 - Curricululm and Assessment - Jan WebbNaace Naace
 
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...Naace Naace
 
Naace Conference 2103 - Creating a Learning Palette using Technology - Sir M...
Naace Conference 2103 - Creating a  Learning Palette using Technology - Sir M...Naace Conference 2103 - Creating a  Learning Palette using Technology - Sir M...
Naace Conference 2103 - Creating a Learning Palette using Technology - Sir M...Naace Naace
 
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...Naace Naace
 
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...Naace Naace
 
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...Naace Naace
 
Naace Conference 2103 - Certified Naace Professionals scheme - Chris Stott
Naace Conference 2103 - Certified Naace Professionals scheme - Chris StottNaace Conference 2103 - Certified Naace Professionals scheme - Chris Stott
Naace Conference 2103 - Certified Naace Professionals scheme - Chris StottNaace Naace
 
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...Naace Naace
 
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin Naace Naace
 
The role and function of ICT in 21st century schools
The role and function of ICT in 21st century schoolsThe role and function of ICT in 21st century schools
The role and function of ICT in 21st century schoolsNaace Naace
 
Key elements of an ICT vision statement
Key elements of an ICT vision statementKey elements of an ICT vision statement
Key elements of an ICT vision statementNaace Naace
 
Naace Think Tank - London
Naace Think Tank - LondonNaace Think Tank - London
Naace Think Tank - LondonNaace Naace
 
Naace Strategic Conference 2009: Mick Waters
Naace Strategic Conference 2009: Mick WatersNaace Strategic Conference 2009: Mick Waters
Naace Strategic Conference 2009: Mick WatersNaace Naace
 
Naace Strategic Conference: Keynote - Niel McLean, Becta
Naace Strategic Conference: Keynote - Niel McLean, BectaNaace Strategic Conference: Keynote - Niel McLean, Becta
Naace Strategic Conference: Keynote - Niel McLean, BectaNaace Naace
 
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele Hull
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele HullNaace Strategic Conference 2009 - Bill Tagg Bursary, Adele Hull
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele HullNaace Naace
 
Naace Strategic Conference 2009 - IMS Framework
Naace Strategic Conference 2009 - IMS FrameworkNaace Strategic Conference 2009 - IMS Framework
Naace Strategic Conference 2009 - IMS FrameworkNaace Naace
 
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...Naace Naace
 
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...Naace Naace
 
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray Tolley
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray TolleyNaace Strategic Conference 2009 - Bill Tagg Bursary - Ray Tolley
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray TolleyNaace Naace
 

Mais de Naace Naace (20)

Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...
Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...
Naace Conference 2103 - Technology Enhanced Learning - more than just a good ...
 
Naace Conference 2103 - Curricululm and Assessment - Jan Webb
Naace Conference 2103 - Curricululm and Assessment - Jan WebbNaace Conference 2103 - Curricululm and Assessment - Jan Webb
Naace Conference 2103 - Curricululm and Assessment - Jan Webb
 
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...
Naace Conference 2103 - Tablet Pedagogies: initial findings from Naace case s...
 
Naace Conference 2103 - Creating a Learning Palette using Technology - Sir M...
Naace Conference 2103 - Creating a  Learning Palette using Technology - Sir M...Naace Conference 2103 - Creating a  Learning Palette using Technology - Sir M...
Naace Conference 2103 - Creating a Learning Palette using Technology - Sir M...
 
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...
Naace Conference 2103 - Using Apps for Good and mobile technology in the clas...
 
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...
Naace Conference 2103 - Inspecting ICT in the Current Curriculum Climate - Da...
 
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...
Naace Conference 2103 - Naace Self-review Framework, ICT Mark and 3rd Millenn...
 
Naace Conference 2103 - Certified Naace Professionals scheme - Chris Stott
Naace Conference 2103 - Certified Naace Professionals scheme - Chris StottNaace Conference 2103 - Certified Naace Professionals scheme - Chris Stott
Naace Conference 2103 - Certified Naace Professionals scheme - Chris Stott
 
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...
Naace Conference 2103 - Tablets for Schools Research: hopes, fears and practi...
 
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin
Naace Conference 2103 - Design thinking for new learning - Graham Brown-Martin
 
The role and function of ICT in 21st century schools
The role and function of ICT in 21st century schoolsThe role and function of ICT in 21st century schools
The role and function of ICT in 21st century schools
 
Key elements of an ICT vision statement
Key elements of an ICT vision statementKey elements of an ICT vision statement
Key elements of an ICT vision statement
 
Naace Think Tank - London
Naace Think Tank - LondonNaace Think Tank - London
Naace Think Tank - London
 
Naace Strategic Conference 2009: Mick Waters
Naace Strategic Conference 2009: Mick WatersNaace Strategic Conference 2009: Mick Waters
Naace Strategic Conference 2009: Mick Waters
 
Naace Strategic Conference: Keynote - Niel McLean, Becta
Naace Strategic Conference: Keynote - Niel McLean, BectaNaace Strategic Conference: Keynote - Niel McLean, Becta
Naace Strategic Conference: Keynote - Niel McLean, Becta
 
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele Hull
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele HullNaace Strategic Conference 2009 - Bill Tagg Bursary, Adele Hull
Naace Strategic Conference 2009 - Bill Tagg Bursary, Adele Hull
 
Naace Strategic Conference 2009 - IMS Framework
Naace Strategic Conference 2009 - IMS FrameworkNaace Strategic Conference 2009 - IMS Framework
Naace Strategic Conference 2009 - IMS Framework
 
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...
Naace Strategic Conference 2009 - MIS Comes out of the Office - Matthew Nall,...
 
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...
Naace Strategic Conference 2009 - Personalisation by Pieces - Dan Buckley, Di...
 
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray Tolley
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray TolleyNaace Strategic Conference 2009 - Bill Tagg Bursary - Ray Tolley
Naace Strategic Conference 2009 - Bill Tagg Bursary - Ray Tolley
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Último (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Being Brave Safely: How Well Equipped Are Schools for BYOD Risks

  • 1. Being Brave Safely How well equipped are you and your school to avoid the potential risks of “bring your own devices”? Ron Richards E-Safety Consultant South West Grid for Learning © South West Grid for Learning Trust
  • 3.
  • 4.
  • 5. 1990 1995 2000 2005 2010 2015 BBS Applications Content Communication Collaboration Entertainment E-Commerce Bandwidth 9.6K 14.4K 56K 64K 128K 1Mb 6Mb 24Mb ? HDD Storage 1GB 2GB 4GB 10GB 50GB 300GB 1TB 2TB ? Internet Age Web 1.0 Web 2.0 Web 3.0?
  • 7. Go figure 3 Family Online Safety Institute (FOSI) http://www.youtube.com/watch?v=hSQ6GcskLNg © SWGfL Trust 2011
  • 12. The Byron Report Safer Children in a Digital World Professor Tanya Byron
  • 13. Byron Review Provide children’s workforce with skills and knowledge Deliver e-safety through the curriculum Reach children and families through extended schools Ensure OfSTED holds the system to account
  • 14. Ofsted – The safe use of new technologies  Active approach to e-safety  Pupil knowledge and understanding  Shared responsibility for e-safety Pupils in the schools that had ‘managed’ systems had  Training – all staff /andGovernors better knowledge all understanding of how to stay safe than those in schools with ‘locked down’ systems. Pupils  Well planned & coordinated curriculum were more vulnerable overall when schools used locked  Policies adapted to circumstances not given enough down systems because they were  Do not have “lock-down” filtering opportunities to learn how to assess and manage risk for  Pupils take responsibility for own safety themselves.
  • 17. E-Safety in schools – “State of the Nation” Prof Andy Phippen andy.phippen@plymouth.ac.uk © South West Grid for Learning Trust
  • 18. 3 4 2.2 2.4 2.6 2.8 3.2 3.4 3.8 3.6 AUP Community understanding Digital and video images Email, chat, etc. E-Safety Committee or Group E-safety education E-Safety Responsibilities Filtering Governor training Governors Information literacy Mobiles and handhelds Monitoring and reporting Monitoring Impact Parental education Aspect averages Password security Personal data Policy development Policy Scope Professional standards Reporting Sanctions Self Evaluation Staff training Technical Security The contribution of young… Website, etc. Whole School Year 2011 Year 2012 Year 2010
  • 19. 2010/2011 Comparison – Best Aspects 2010 2011 2012 • Filtering (2.57) • Filtering (2.5) • Filtering (2.48) • AUPs (2.78) • Policy Scope • Policy Scope • Policy Scope (2.65) (2.58) (2.8) • AUPs (2.71) • AUP (2.71) • Digital and • Digital and • Digital and video images video images video images (2.93) (2.83) (2.74) • Policy • Policy • Policy development development development (3.02) (2.88) (2.8)
  • 20. 2010/2012 Comparison – Weakest Aspects 2010 2011 2012 • Community • Community • Community understanding understanding understanding (4.03) (4) (3.91) • Governor • Governor • Governor training (4.03) training (3.93) training (3.85) • Monitoring the • Monitoring the • Monitoring the impact of the impact of the impact of e-safety policy e-safety policy policy and and practice and practice practice (3.96) (3.9) (3.85) • E-Safety • E-Safety • Staff training Committee Committee (3.73) (3.94) (3.82) • E-Safety • Staff training • Staff training Committee (3.84) (3.76) (3.67)
  • 21. Improvement 2012 • Mobiles and • Monitoring and handhelds (0.28) reporting (-0.1) • Professional • AUP (0) standards (0.2) • Self Evaluation (0) • E-Safety • The contribution of Responsibilities (0.14) young people (0.01) • E-Safety Committee • Filtering (0.03) or Group (0.13) • Website, etc. (0.12)
  • 22. 0.5 2.5 3.5 4.5 1.5 0 2 3 4 1 AUPs Community understanding Digital and video images Email, etc. E-Safety Committee or… E-safety education E-Safety Responsibilities Filtering Averages Governor training Governors Information literacy Mobiles Monitoring and Reporting Monitoring the impact Parental education Password security Personal data Policy development Policy Scope Professional Standards Reporting Sanctions Self Evaluation Staff training Technical Security Primaries vs Secondaries The contribution of young… Website, VLE + public… Whole School Primary Average Secondary Average
  • 23. 0 1 0.2 0.6 0.8 1.2 -0.2 0.4 AUPs Community understanding Digital and video images Email, etc. E-Safety Committee or… E-safety education E-Safety Responsibilities Filtering Governor training Governors Information literacy Mobiles Monitoring and Reporting Monitoring the impact Parental education Password security Personal data Policy development Policy Scope Professional Standards Reporting Sanctions Self Evaluation Staff training Technical Security The contribution of young… Website, VLE + public… Whole School Getting closer and closer... 2010 Difference 2011 Difference 2012 Difference
  • 24. 1.5 2.5 3.5 0.5 0 1 2 3 4 Acceptable Use Policies Administrators Community Understanding Digital and Video Images Digital Citizenship for Students Digital Literacy Disciplinary Action Email, Chat, Social Networking,… E-Safety Committee E-Safety Responsibilities Evaluate and Adjust Policy Evaluate and Assess Incidents US Old Average Filtering Mobile Phones and Personal… Parental Education Password Security Personal Data Policy Development Policy Scope Professional Use Standards Aus Old Average Reporting Self-Evaluation Student Contribution Technical Security Training for Administrators UK Average Training for Faculty Training for Librarian/Media… Training for Network Administrator International Comparisons Training for Safe Schools… Training for School Counselor Training for School Nurse Training for Staff Website, Online Education,… Whole School
  • 26. Teach new media literacy that involves critical thinking Bridge the gap Enable the safe between formal use of mobile and informal technologies learning How do we begin to change? Factor in Empower young adolescent brain people to protect development and themselves have a granular rather than being approach safety seen as potential education victims Promote ethic of good online citizenship
  • 27. Rather than locking down the internet, support its most enriching uses Ensure that ALL staff receive How do we Empower parents. regular and begin to Encourage relevant up to date change? engagement. Widen the participation of more professionals beyond the technical.
  • 28. Online grooming Cyberbullying Sexting Identity theft Online personal identity Online professional identity Geolocation based risks Addiction and dependency Personal data accountabilities
  • 32. Review – Aspect Page On the aspect pages you will choose the most suitable level statement for your school for that aspect
  • 33. On each aspect page you choose the level statement that best fits your school. This symbol shows the “accreditation benchmark level” for the aspect When you have chosen your level it is highlighted like this. Review – Aspect Page (top part)
  • 34. Improvement action changes as you change your chosen level statement Possible sources of evidence are suggested Clicking on these links opens relevant policy templates and other guidance Here you can add free text in evidence, action notes or comments sections Review – Aspect Page (bottom part)
  • 35.
  • 36. Links to Resources © SWGfL Trust 2011
  • 37. Free Text Boxes / Collaboration © SWGfL Trust 2011
  • 42. South West Grid for Learning SWGfL Services - Filtering – Transparent Filtering Module How do I get it? There’s no What is it? additional charge • An enhancement to SafetyNet Plus that allows any device Visit ESI or email to use the service without needing any configuration sis@swgfl.org.uk for details Why have we done it? • Growing use of ‘guest’ and ‘personal’ devices in schools • Proxy is inconvenient and not always technically possible • Traditional ‘transparent proxy’ is limited • Our Solution (not transparent proxy): • One solution for HTTP and HTTPS - inspects all HTTP traffic and can filter HTTP requests on non- standard ports (and can apply filtering to other protocols e.g. IM) • No support for a proxy required and no client configuration required • Works with existing systems - same admin interface and no change in policies or experience - completely transparent to the end user • It doesn’t matter whether proxy is configured or not - users can transition when they want to
  • 43. Amber lines Content Filtering indicate unfiltered traffic from / to the Transparent Services: client Green lines indicate clean traffic from / to the client Red lines indicate blocked traffic (the connection control resets the connection with the client and server) Brown lines are control signals
  • 44.
  • 50.
  • 53.
  • 54. E-safety Curriculum © South West Grid for Learning Trust
  • 55. Mapping the curriculum • Where are e-safety topics covered? • Are topics duplicated? • Is the curriculum progressive – does each year build on the last? • Is there breadth? – not just safety and security, but digital literacy • Do the children contribute? • Who has the responsibility to map this provision? • E-Safety Lead? • E-Safety Committee? • ICT Lead? © SWGfL Trust 2011
  • 59.
  • 60. Digital Literacy Curriculum © SWGfL Trust 2011
  • 66.
  • 67.
  • 68. Sample BYOD AUP Guidelines for use · Use of personal devices during the school day is at the discretion of teachers and staff. Students must use devices as directed by their teacher. · The primary purpose of the use of personal devices at school is educational. Personal use for personal reasons is secondary. · The use of a personal device is not to be a distraction in any way to teachers or students. Personal devices must not disrupt class in any way. · The use of personal devices falls under School Acceptable Use Policy, found in the student handbook · Students will refrain from using personal devices outside of their classroom unless otherwise directed by their teacher · Students shall make no attempts to circumvent the school’s network security and/or filtering policies. This includes setting up proxies and downloading programs to bypass security. · Students shall not distribute pictures or video of students or staff without their permission (distribution can be as small as emailing/texting to one other person or as large as posting image or video online)
  • 69. Questions to address • Why are you doing it? – educational goals • Policy & buy-in • What devices / software will you allow? • Access to internet or network? • Technical Solutions – transparent filtering • IT Support? • Acceptable use policy / sanctions • Staff training • Education • Parental understanding • Equity issues?
  • 70. Be brave - safely • Start small – trial project • Involve young people • Expect that in the short term there may be more incidents eg cyberbullying – plan for and deal with • Inspire cultural change