Professional Documents
Culture Documents
The notes will assist in the assessment process and as a reference document.
The SSS Learning video content and course notes are intended to inform participants and
should not be seen, or acted upon as legal advice.
Copyright © 2022 SSS Learning Ltd. All rights reserved. (September 2022) V8.0
All trademarks referenced in this document are acknowledged as the property of their respective
owners. Their use here does not imply any affiliation with, or endorsement of, the referenced
products.
Introduction
This course is designed to provide an overview of the topics related to the subject of e-safety. In
this course we examined the following topics:
• Cyberbullying;
• Victim Behaviour;
• Legislation;
• Radicalisation;
• The Dark Web;
• Online Child Sexual Exploitation;
• Child Criminal Exploitation;
• Child Financial Exploitation;
• Sexting;
• Online Profile Management;
• Cybercrime;
• Internet Use Policies;
• School / Academy Responsibilities;
• Best Practice.
Cyberbullying
Cyberbullying can be described as bullying using electronic communication. This form of bullying
can take place via text message, over social networks or via any number of communication systems
available over the internet. This type of bullying has a greater impact on the victim when there is
an element of repetition and a real or perceived power imbalance between the victim and the
perpetrator(s).
A survey1 of 6,000 10 – 18 year-olds conducted by the European Commission’s Joint Research Centre
found that 50% of children had experienced at least one kind of cyberbullying in their lifetime. In
the eleven European countries included in the report, 44 % of children who had been cyberbullied
before the global Covid-19 pandemic stated it had happened even more during lockdown.
Cyberbullying is particularly unpleasant as the bully can often maintain their anonymity, intimidate
and threaten directly or as part of a wider group and so feel emboldened.
The victim is remote from the perpetrator who may be unaware of the destructive effect of their
actions. As a result, perpetrators may become increasingly more severe in their attacks. The attacks
may be repeated, further compounding the destructive impact on the victim.
Cyberbullying includes:
Victims may:
If you suspect that a pupil may be subject to cyberbullying then follow the procedure
documented within your Safeguarding Policy and share your concerns with your Designated
Safeguarding Lead or a Named Person.
Cyberbullying Legislation
Section 1 of the Malicious Communications Act 1988 makes it an offence to send another person
an electronic communication which is threatening, or the sender believes to be false, in order to
cause distress or anxiety. A person found guilty of such an offence is liable for up to two years in
prison and a fine. This section is not applicable to Scotland or Northern Ireland.
Section 127 of the Communications Act 2003 applies to the whole of the UK and makes it an offence
to transmit any
Section 89 of the Education and Inspections Act 2006 requires that State schools in England and
Wales must produce a Behaviour Policy or additional policy which states the strategy for the
management of anti-bullying.
‘encouraging good behaviour and respect for others on the part of pupils
and, in particular, preventing all forms of bullying among pupils’.
Academies and independent schools are also required to have a Behaviour Policy and should
develop and implement effective anti-bullying strategies. The anti-bullying strategy should also
stipulate each organisation’s policy relating to the prevention of cyberbullying as well as offline
forms of bullying.
Anti-bullying and Cyberbullying policies may regulate the behaviour of pupils when they are not in
the educational setting or under the control of a teacher to an extent that is reasonable.
The policy must be periodically reviewed by governance and if they would like revisions to be
made, they should provide advice and guidance prior to ratification. Senior Leadership must act in
accordance with governance wishes.
Article 3 of the Education (Northern Ireland) Order 1998 (as amended) provides similar powers in
Northern Ireland.
Currently there is no anti-bullying legislation applicable to Scotland. The Scottish Government has
set out its anti-bullying agenda in the document Respect for All: The National Approach to Anti-
bullying for Scotland’s Children and Young People. This document makes it the responsibility of
organisations working with children and young people to develop an Anti-bullying Policy ‘in step
with the principles and values that underpin Respect for All’.
Radicalisation
Young people are at risk of encountering individuals online who may express extreme views. These
propagandists may seek to promote their views in an attempt to radicalise susceptible individuals.
There are a number of terror groups who aim to recruit individuals to their cause. These include:
Terrorist groups target individuals who sympathise with their cause in order to build rapport and
isolate individuals from mainstream views. By developing an online social group, they can nurture
increasingly extreme points of view within the group, which ultimately leads to radicalisation.
As the radicalisation process progresses, these groups are often directed to communicate via
the dark web or via encrypted messaging services where law enforcement agencies find it more
difficult to find and trace individuals. The dark web is also used to point individuals to extreme
illegal content that would be taken down by legitimate internet hosting companies.
Dissemination of terrorist publications is made illegal by Section 2 of the Terrorism Act 2006.
or
Evidence suggests that people at risk of radicalisation appear to be normal members of society.
Research after the Second World War identified personality traits that may put a person at risk
from radicalisation.
Traits include:
• A perception that they have been subject to discrimination or exclusion, resulting in damage to
their ego;
• Becoming argumentative and domineering;
• A strong need to obtain definitive solutions to ambiguous issues, leading to inclination towards
groups providing authoritarian or dogmatic solutions;
• A tendency to become anxious and insecure under conditions that contradict their world view.
The dark web was developed in collaboration with the US Naval Laboratory in order to provide a
method for libertarian groups within despotic countries to gain impartial information and to be
able to report on governments’ misdemeanours anonymously. However, despotic governments
may utilise users’ internet activity as a reason to punish opposition to the state. They may also
restrict the news available to their population, instead directing to approved government sources.
The dark web is a term used to describe a small section of the internet which offers the person
viewing, and the websites that they view, total anonymity. This area is only accessible using a
special Tor browser which wraps every bit of the information request sent out to the internet in
multiple layers of encryption.
Individual servers on the Tor network then decrypt one layer of encryption before sending the
request out to the Tor network again for another Tor server to retrieve and decrypt another layer.
After several such relays, the original request is deciphered and bits of the information request are
relayed to the desired website.
The website then returns the desired information via the Tor network and the returned information
is re-encrypted by each individual server until the layers of encryption are removed by the browser.
Each request is handled by a different set of servers making it virtually impossible for anyone to
intercept and understand the whole of the original information.
This methodology is termed ‘onion skin routing’ as this describes the layers of encryption that
enclose the information. Common browsers such as Internet Explorer, Chrome, Firefox and Safari
are not designed to process these encrypted files and so cannot access the dark web.
Whilst the original concept of the Tor network was laudable allowing the world to discover the
plight of many people’s suffering, particularly in the Middle East, it has introduced significant
safeguarding risks. The anonymity provided by the dark web has been exploited by those wishing
to evade legal jurisdictions. The Tor network allows servers within the network to serve web pages
as well as relay encrypted messages.
Of these just under half were inactive and not in use leaving 2,732 active websites. At least 57% of
these websites provided illegal products or services. e.g.
Category Details
Drugs Trade or manufacture of illegal drugs including legally obtained prescription
medicine
Extremism Content espousing extremist ideologies, including ideological texts, expressions
of support for terrorist violence, militant how-to guides and extremist community
forums
Finance Money laundering, counterfeit bills, trade in stolen credit cards or accounts
Hacking Hackers for hire, trade or distribution of malware or DDoS capabilities
Illegitimate Pornographic material involving children, violence, animals or materials obtained
pornography without participant’s consent
Nexus Websites primarily focussed on linking to other illicit websites and resources
within the dark net
Other illicit Materials that did not easily fit into the other categories but remain problematic,
such as trade of other illegal goods and fake passports or IDs
Social Online communities for sharing illicit material in the form of forums, social
networks and other message boards
Violence Hitmen for hire and instructional material on conducting violent attacks
Other Non-illicit content such as ideological or political content, secure drop-sites,
information repositories, legitimate services
None Websites which were either completely inaccessible or otherwise had no visible
content, including websites which hosted only place holder text, indicating that
their operator had yet to generate indicative content.
Cryptopolitik and the Darknet
The global law enforcement community are working hard to identify and pursue the individuals
involved in such activity but the anonymity provided by the network and the multinational
extent makes this work extremely difficult.
Some young people are tempted to enter the dark web. Internet searches return links to online
gaming and illegal download sites on Tor which can draw them into using the dark web. The
games on these sites are likely to be extreme in their depiction of violence and sexual content
and may be illegal and disturbing.
Many of the files downloaded from illegal download sites are likely to be impregnated with
highly exploitative viruses. Use of anything from the dark web is extremely unwise as they have
most likely been provided by dangerous and unscrupulous criminal elements.
Such sites are likely to be ‘honeytraps’ set by criminal or paedophile gangs in order to harvest
information used to groom or gain leverage over users to extort and blackmail them either for
Another possible draw of the dark web is by those wishing to obtain illegal drugs. There are
reportedly factories in the Far East producing illegal drugs on an industrial scale. Much of their
merchandise is sold via the dark web and available via mail order. Many of these drugs are
highly addictive and extremely potent and dangerous. Use of these drugs have been fatal in a
high proportion of cases.
It is difficult to justify why most people in the UK would access the dark web for legitimate
purposes. If you become aware of a pupil accessing the dark web, especially websites with
the suffix ‘.onion’, report this immediately to your DSL or Named Person and follow your
Safeguarding Policy.
The aim of OCSE is to deceive victims into producing indecent images of themselves, engaging
in sexual chat or sexual activity over webcam. OCSE can also lead to offline offending, such as
meetings between an adult and a child for sexual purposes.
The environments where offending occurred were: social networks; chat and instant messaging;
gaming and mobile phones. Most offending occurs on social networks followed by chat and instant
messaging sites.
According to National Crime Agency estimates, 300,000 individuals in the UK are thought to be
involved in downloading and sharing indecent images of children. Investigators monitoring a single
online chatroom in 2017 identified 4,000 men using it from the UK alone.
In recent years the internet and social media sites are also being used as mechanisms to facilitate
Child Financial Exploitation (CFE). In 2020, 8,791 young people under 21 years (some as young
as 13) were caught acting as money mules, also known as ‘squaring’, that is transferring illegally
obtained money on behalf of someone else.5 In this form of CFE, the perpetrators transfer money
into the victim’s account who then transfers the funds on into another account on behalf of the
perpetrator. Organised criminal gangs prey on young people, recruiting them:
Sexting
Sexting is the sending of sexual messages including text, images (often selfie images) or video (often
selfie videos) via SMS or chat. It usually happens consensually between partners after some coercion.
However, once text, an image, or video is shared then it can be duplicated and forwarded on.
Sharing of obscene sexual images is an offence and it can be very difficult to stop once the image
is out of control of the victim. Such images can be highly destructive to the wellbeing of the victim.
The Child Protection and Safeguarding policy / policies should include procedures for dealing with
child-on-child abuse. All staff should also be issued with Part five of KCSIE, child on child sexual
violence and sexual harassment, and should be aware of the UKCIS advice about the sharing of
nudes and semi-nude images and videos. Children should understand that non-consensual sharing
of such images and / or videos is both illegal and abusive and that even if the sharing is consensual
this action is illegal.
5. Cifas 2021
8
A NSPCC survey6 conducted between February and March 2018 involving 40,000 children across
the UK discovered that:
• 1 in 25 primary school children had been sent or shown a naked or semi-naked image by an
adult;
• 1 in 20 secondary school children had been sent or shown a naked or semi-naked image by an
adult;
• 1 in 20 primary school children had been sent or shown a naked or semi-naked image by another
young person;
• 1 in 8 secondary school children had been sent or shown a naked or semi-naked image by
another young person.
Pupils should be warned never to share indecent images of themselves with anyone, no matter
how much they care for them.
• Ensure appropriate safeguards are in place to protect students within the setting;
• Equip pupils to understand the dangers faced by the internet and how these can be mitigated;
• Provide suitable controls as part of the organisation’s IT infrastructure;
• Implement effective ICT and safeguarding policies;
• Educate pupils about the dangers posed by the internet, including the dark web.
If you become aware or have suspicions that a pupil may be subject to online child sexual
exploitation then you should contact your DSL or Named Person immediately. It is impossible to
fully control access to the internet for any child, however appropriate safeguards must be in place
to protect pupils within the educational setting and pupils they should be equipped to understand
the possible dangers and how these can be mitigated. Suitable controls should form part of your
IT infrastructure and be contained within the ICT Policy and Safeguarding Policy. Adherence to
the ICT Acceptable Use agreement should be explained and pupils asked to sign to commit to
the organisation’s expectations. Throughout the UK there is a requirement under the National
Curriculum to educate pupils about the dangers posed by the internet. Police Community Support
Officers may also provide lessons to support e-safety.
If you become aware or suspect a pupil may not be adhering to the conditions stated in the ICT
Acceptable Use Agreement, concerns should be shared with your DSL or a Named Person.
Social media can be a useful way to keep in touch with friends and families but care should be
Young people are allowed to set up a profile on some social media sites from as young as the age
of 9. Whilst the majority of sites restrict users to above age 13, recently some have raised the user
age requirement to age 16. However, some children will lie about their age so that they can set
up an account when under age. Paedophiles trawl social media looking for potential victims. It is
estimated that 48.5% of OCSE occurs on social media.
Messenger
Enables users to instant message with other users, one-to-one or groups.
WhatsApp
This app, owned by Facebook, enables users to avoid SMS fees allowing them to:
10
Calls can be blocked by tapping the ‘i’ icon and selecting ‘Block this caller’.
Instagram
A picture and video sharing app where users:
Google Hangouts
A computer program and app without parental controls where users can phone or message other
users one to one or in group conversations.
Kik
An instant messaging app where users can share photos, games and internet content.
Omegle
A social network site which facilitates users talking to strangers by randomly connecting users to
other users. Users can:
Minimum age 18+ or 13+ with parental permission (no age verification process)
Skype
A computer program and app where users can message and make video calls to users around the
world. Users can control how their profile appears in search results within settings and privacy
options.
11
Minimum age 13+ (A date of birth has to be entered when downloaded and, if under 13yrs,
users are directed to SnapKidz)
YouTube
Enables users to watch, comment and create videos. YouTube allows live streaming. (YouTube
Kids may be a safer option which allows parents to set an age level and time limits).
Twitter
A social media site and app where users can:
TikTok
A video sharing social networking app where users can:
Young people also are often not particularly discerning about who they allow as a ‘friend’. Some
teenagers have accounts with several hundred or even several thousand friends. CEOP estimates
that the average 12 – 15-year-old does not know up to 25% of their ‘friends’ offline. CEOP also
12
Statistics7 show that Instagram was the social media service most likely to be used by children
aged 12 to 15 years during 2020 in the United Kingdom, while SnapChat and Facebook were closely
placed in second and third. 69% of those aged 12 to 15 years reported using Facebook, compared
with 62% of respondents using WhatsApp.
Users under 18 should not publicise their activities to the wider internet unless they have a very
good reason. Adults should think carefully about who can see their profile, particularly if working
with children. Privacy settings should be set to ‘friends only’ rather than ‘friends of friends’. Restrict
online friends to real friends and family that known offline. Post carefully, think about who might
see it. Have an arrangement with offline friends not to post (or tag) potentially embarrassing
images of each other. Agree that nothing gets posted unless it is ok with the person in the post.
Avoid embarrassing behaviour in a crowded place, it is likely to end up online. Social media is a
place to keep in contact with friends. In face-to-face interactions a quip can quickly be forgotten.
On social media posts however, the joke remains and as time passes and circumstances change
the joke may become crass, crude, offensive or even illegal. The internet and social media forums
enable children with special educational needs and / or disabilities (SEND) to make friends without
having to communicate face-to-face, building friendships and relationships which they may
not have in their offline life. It is important for all staff to recognise that children with SEND are
potentially more at risk of sexual violence and sexual harassment from their peers and to the
additional risks they may face online e.g. online bullying, grooming and radicalisation. In addition,
Designated Safeguarding Leads (DSLs) and their deputies have a statutory duty8 to ensure they are
confident they have the capability to support SEND children to stay safe online
Staff should be aware that most ICT Acceptable Use Agreements will include a clause on expected
social media use.
If you find that your social media profile no longer reflects that person that you wish to
portray to the world, then consider deleting your profile and setting up a new one. Follow
the instructions on social media help pages to do this. If you just stop using the profile it will
remain there indefinitely.
Cybercrime
Cybercrime is the use of computers and the internet with criminal intent. It covers a wide range of
activities and can be divided into two categories:
and
Computer assisted crimes are those that are supported by the use of computers but the underlying
crime could be committed without a computer. This includes fraud, bullying, harassment, sabotage,
music & video piracy, and identity theft.
They could also be subject to attack by hackers using key logging software (in order to harvest login
details) or root kits (used to bypass login screens and gain administrator privileges).
Systems for data management must be robust and fully implemented to meet General Data
Protection Regulation (GDPR) standards. A breach of sensitive data can result in fines equating to
as much as £20M or 4% of global annual turnover.
A breach of network security could be disastrous resulting in theft of user’s personal information
or the destruction of user’s work. Network administrators must ensure that malware detection
and prevention software such as antivirus software are well maintained and frequently updated.
They must also ensure that gateways to the network are appropriately secured by up to date
firewall software and hardware. Data stored on the network must be backed up frequently so that
it can be recovered in the event of damage to the original copy.
School/Academy Responsibilities
There must be effective policies in place to control the use of mobile phones within the educational
setting. Most schools and academies will not want to take responsibility for the removal and return
of mobile devices each day as this is logistically impractical. However, pupils should not routinely
be allowed to access their mobile devices during lessons. This policy should be rigorously enforced
by all members of staff and effective sanctions should be in place and applied routinely. Teaching
14
A clear and robust policy in relation to the prevention of bullying, including cyberbullying should
also be in place. This policy should detail what constitutes bullying and the measures, sanctions
and disciplinary structure that the school/academy will implement in the event of an alleged breach
of the policy.
• Be taking allegations seriously. A thorough investigation should be carried out to collate evidence;
• Take swift and appropriate action to resolve issues;
• Communicate effectively with parents (and guardians) as well as pupils;
• Have a simple staged approach to resolution with clear consequences for poor behaviour to
discourage others;
• Support perpetrators in recognising and mitigating bullying behaviour and providing support in
resolving any underlying issues.
Section 2 of the Education Act 2011 (as amended) provides authorised members of staff (in England
and Wales) with the power to search pupils for items prohibited by law or the school / academy
policies. Before such powers can used, appropriate safeguarding measures and school / academy
policies must be in place.
As most schools and academies issue staff with laptops, full disk encryption is essential to protect
data in the event of hacking, loss or theft. Simply relying on password protection is not robust
as this can be bypassed, either by booting from a new source or by removing the hard drive and
installing in another computer, giving access to all the stored files. The use of USB sticks is not
ideal due to the vulnerability of virus transmission, however, if used they should be restricted to
encrypted ones issued by the school or academy.
Schools and academies should ensure internet filtering restricts access to websites known to be
inappropriate in accordance with the Internet Use Policy; carry-out logging and active monitoring
and investigation of transgression by users and logs should be retained for a suitable period
to facilitate investigation into allegations. Active monitoring should be in place to pick up and
restrict any new inappropriate websites. Network administrators should be alert to the use of
proxy websites which can be used to bypass their own internet filters. and ensure access to proxy
websites is prohibited and filtered.
Users should be provided with a simple method of reporting inappropriate sites that have not
been picked up by the internet filters. These should be blocked within a reasonable timescale or a
message relayed to the reporter explaining why the site was not blocked.
A detailed disciplinary procedure should be in place for pupils and staff relating to inappropriate
internet use. These procedures should be rigorously and proportionately enforced using staged
intervention with effective sanctions so that all users get the message that inappropriate use of the
internet will not be tolerated.
Senior Leadership must ensure that in monitoring the network, that the organisation complies
15
Best Practice
It is best practice to develop an integrated approach to e-safety which should dovetail with
other policies covering safeguarding issues.
Senior Leadership need to demonstrate that e-safety is taken seriously and should be clearly
defined as a role for senior management and governance.
• Periodically review and evaluate current policies practice to identify areas for improvement;
• Maintain a current knowledge of technology, e-safety issues, legislation and research;
• Contribute to the development of an effective ICT/PHSE curriculum encompassing current issues
and developing a responsible attitude to e-safety by pupils to keep themselves and others safe
online;
• Maintain staff knowledge and understanding of e-safety issues through regular updates within
the CPD programme;
• Encourage and support parents in making sensible choices to help to protect pupils;
• Devise and review policies for staff, volunteers and parents in relation to taking (and posting)
photographs and sharing contacts with pupils;
• Ensure all stakeholders are aware of the channels available to report concerns;
• Have responsibility for conducting risk assessments relating to the safe use of technology;
• Maintain an incident book of e-safety issues and periodically review incidents to mitigate future
risks through updates to the risk assessment and policies.
16
Cybercrime – the use of computers and the internet with criminal intent.
Dark web – an encrypted area of the internet using an encrypted web browser and encrypted web
servers providing anonymity to users and web site providers. Also called the Dark Net. The main
provider of these services is the Tor Browser and Tor Network.
E-safety – Electronic safety. Measures taken to ensure technology users remain safe from harm
derived from the internet (or other network).
Identity theft – Theft of personal information (e.g. bank details, photograph, passwords etc.) or
purporting to be another person in order to commit fraud or for some other illegal advantage.
Hacking – Gaining unauthorised access to private areas of a computer network either by the
unauthorised use of a password or by circumventing the security protocols.
Malware – Malicious Software such as viruses, worms, Trojans and software bombs.
Peer-to-peer networks – A network facilitating access to file sharing on the computer of the
end user. This allows illegal sharing of music, videos and software by users without the network
servers storing the illegal files, thus supposedly protecting the network owners from copyright
infringement.
Profile – Personal information posted by an individual user, often via social media to friends and/
or to the general public. This may include name, contact details, date of birth, photographs and
other personal details about their life.
Sexting – A text message containing sexually explicit content such an explicit image often sent
between consenting partners.
Software bomb – a form of malware which conceals itself on a computer until a specific trigger
is activated such as a date or a user action. The malware then activates to cause damage to the
computer (or network) and/or relay private information to the perpetrator.
17
Spoofing – Emulating a genuine website (particularly online banking websites) in order to deceive
users into providing their personal information such as bank log in details in order to commit fraud.
Phishing – Sending junk email to tens of thousands or recipients in an attempt to deceive each
recipient into providing personal information such as their bank account details generally in order
to commit fraud.
Proxy website – a website that allows the visitor to use their website as a window to view other
websites on the internet, thus bypassing internet filters restricting access.
Tor – The open source community who have developed the largest multiple encrypted and
anonymous network on the internet, often called the ‘Dark Web’. This comprises of the Tor
Browser and the Tor Network. Messages are relayed using multiple layers of encryption to protect
anonymity. The layers of encryption surrounding information are analogous to an onion which has
resulted in the Tor logo being an onion and the browser sometimes being called the onion browser
and routers within the Tor network being called onion routers.
Trojan – a piece of malware that appears to be benign software such as a document, image or
music file. Once opened, this software usually attempts to infect the host computer, duplicates
itself and may also attempt to propagate through the host network or via email to contacts. Trojans
can be highly destructive or be used to send personal user information (such as passwords or
banking information) to the perpetrator.
Virus – Malware computer code embedded within a host file. The virus code duplicates itself
and attempts to infect other files throughout a network in order to cause damage or to transmit
personal user information.
Worms – A malware file capable of replicating and propagating in a similar way to a virus code.
18
Computer Misuse Act 1990, as amended by the Police and Justice Act 2006,
https://www.legislation.gov.uk/ukpga/1990/18/contents
Offence of sharing copyright material without permission (i.e. peer to peer networks).
Copyright, Designs and Patents Act 1988, amended by the Copyright and Related Rights
Regulations 2003,
https://www.legislation.gov.uk/uksi/2003/2498/regulation/26/made
Prohibition of publication of obscene matter and powers to search for obscene matter. Obscene
Publications Act 1959,
https://www.legislation.gov.uk/ukpga/Eliz2/7-8/66/contents
Duty on schools to have due regard to the need to prevent people from being drawn into terrorism.
• Counter-Terrorism and Border Security Act 2019, defines and prohibits the act of harassment
and stalking
• Protection from Harassment Act 1997
https://www.legislation.gov.uk/ukpga/1997/40/contents
19
Northern Ireland
Duty of head teachers and governors to determine measures to prevent all forms of bullying and
promote good behaviour.
Scotland
Criminalises the non-consensual sharing of intimate images.
20
Islamist Radicalisation: A Root Cause Model Tinka Veldhuis & Jørgen Staun, The Hague,
Netherlands Institute of International Relations Clingendael.ISBN/EAN:978-90-5031-146-5
https://www.researchgate.net/profile/Jorgen_Staun/publication/237624856_Islamist_
Radicalisation_A_Root_Cause_Model/links/55c9cfff08aebc967df972dc.pdf
The Guardian - Synthetic opioid crisis in US serves as warning for the world, says UN. Fri 18 Aug
2017 https://www.theguardian.com/us-news/2017/aug/18/un-synthetic-opioid-crisis-uk-australia-
deaths
BSC (Olivia Ridout) - Schools: Know your legal responsibilities around Internet safety, http://www.
bcs.org/content/ConWebDoc/55739
ChildNet International. Cyberbullying: Understand, Prevent and Respond - Guidance for schools
2016. http://www.childnet.com/resources/cyberbullying-guidance-for-schools Lobe, B; Velicu. A;
Staksrud. E; Chaudron. S; Di Gioia. R; (2021) How children (10-18) experienced online risks during
the Covid-19 lockdown- Spring 2020
CEOP Threat Assessment of Child Sexual Exploitation and Abuse June 2013
https://www.norfolklscb.org/wp-content/uploads/2015/03/CEOP_Threat-Assessment_CSE_
JUN2013.pdf
https://www.nspcc.org.uk/preventing-abuse/child-abuse-and-neglect/child-sexual-exploitation/
Annual Research Review: Harms experienced by child users of online and mobile
technologies: the nature, prevalence and management of sexual and aggressive risks
in the digital age. Sonia Livingstone, Peter K. Smith. First published: 20 January 2014
http://onlinelibrary.wiley.com/doi/10.1111/jcpp.12197/full#jcpp12197-bib-0034
Building Trust with Children and Young People at Risk of Child Sexual Exploitation: The Professional
Challenge. Michelle Lefevre, Kristine Hickle, Barry Luckock, Gillian Ruch. The British Journal of Social
Work, Volume 47, Issue 8, 1 December 2017, Pages 2456–2473, Published: 14 February 2017
https://academic.oup.com/bjsw/article/47/8/2456/2995899
Chained Exploits: How Hackers Combine Attacks to Hack You By Andrew Whitaker Jan 27, 2010
http://www.informit.com/articles/article.aspx?p=1439194
Hutchinson, W., Warren, M., & Burn, J. (2001). Survival in the e-conomy: 2nd Australian information
warfare & security conference 2001. Churchlands, Australia: School of Management Information
21
Lavis, A., & Winter, R. (2020). Online harms or benefits? An ethnographic analysis of the positives
and negatives of peer-support around self-harm on social media. Journal of Child Psychology and
Psychiatry, 61, 842–854.
Odgers, C.L., & Jensen, M.R. (2020). Annual research review: Adolescent mental health in the
digital age: Facts, fears, and future directions. Journal of Child Psychology and Psychiatry, 61,
336–348.
The Telegraph, Dark web browser Tor is overwhelmingly used for crime, says study Cara
McGoogan2 February 2016
https://www.telegraph.co.uk/technology/2016/02/02/dark-web-browser-tor-is-overwhelmingly-
used-for-crime-says-study/
The darkness online - Cryptopolitik and the Darknet, Daniel Moore & Thomas Rid Pages 7-38 |
Published online: 01 Feb 2016
https://www.tandfonline.com/doi/full/10.1080/00396338.2016.1142085
How social media is used to encourage travel to Syria and Iraq: briefing note for schools, 1 July
2015 Department for Education and Home Office
https://www.gov.uk/government/publications/the-use-of-social-media-for-online-radicalisation
Families Against Stress & Trauma FAST: A website dedicated to combating radicalism. Spot the
signs. http://familiesmatter.org.uk/take-action/spot-the-signs/
Roughly how many friends do you have on Facebook? A survey of 899 15 -18 year olds in the UK.
August 21, 2014 to August 28, 2014
https://www.statista.com/statistics/330810/average-number-of-facebook-friends-among-
teenagers-in-great-britain/
DFE - Preventing and tackling bullying Advice for headteachers, staff and governing bodies, July
2017
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/623895/
Preventing_and_tackling_bullying_advice.pdf
Statista Research Department (2021) Social media usage among children in the United Kingdom
https://www.statista.com/statistics/415138/social-media-usage-among-children-uk/
Department For Education (2020) Working together to safeguard children A guide to inter-agency
working to safeguard and promote the welfare of children
Department For Education – Child sexual exploitation Definition and a guide for practitioners, local
leaders and decision makers working to protect children from child sexual exploitation
22
https://www.slideshare.net/Ofstednews/childinternetsafetysummitonlinesafetyinspection
Social-media-giants-terms-and-conditions-jargon-buster
https://www.childrenscommissioner.gov.uk/2017/09/29/childrens-commissioner-launches-social-
media-giants-terms-and-conditions-jargon-buster-to-give-kids-more-power-in-digital-world/
23
Northern Ireland
Department of education - Safeguarding and Child Protection in Schools A Guide for Schools , 24
April 2017
https://www.education-ni.gov.uk/publications/safeguarding-and-child-protection-schools-guide-
schools
Wales
Welsh Government 057/2011 - Respecting others: Cyberbullying September 2011
http://gov.wales/topics/educationandskills/publications/circulars/antibullying/?lang=en
2008 All Wales Child Protection Procedures - Produced on behalf of All Local Safeguarding Children
Boards in Wales
http://www.childreninwales.org.uk/policy-document/wales-child-protection-procedures-2008/
Safeguarding children: Working together under the Children Act 2004. Welsh Government
http://gov.wales/topics/health/publications/socialcare/guidance1/safeguardingunder2004act/?lang=en
24
At <INSERT NAME OF SCHOOL> we respect and value all children and are committed to providing
a caring, friendly and safe environment for all our pupils so they can learn, in a relaxed and
secure atmosphere. We believe every pupil should be able to participate in all our activities in an
enjoyable and safe environment and be protected from harm. This is the responsibility of every
adult employed by, or invited to deliver services at <INSERT NAME OF SCHOOL/ ACADEMY>. We
recognise our responsibility to safeguard all who access our site and promote the welfare of all our
pupils by protecting them from physical, sexual and emotional abuse, neglect and bullying.
POLICY STATEMENT
Governance at <INSERT NAME OF SCHOOL/ ACADEMY> recognises the use of its ICT and
communications facilities as an important resource for teaching, learning and personal development
and as an essential aid to business efficiency. It actively encourages staff to take full advantage of
the potential for ICT and communications systems to enhance development in all areas of the
curriculum and administration. It is also recognised by governance that along with these benefits
there are also responsibilities, especially for ensuring that pupils are protected from contact with
inappropriate material.
In addition to their normal access to ICT and communications systems for work-related purposes,
governance permits staff limited reasonable personal use of ICT equipment and e-mail and internet
facilities during their own time subject to such use:
Whilst our ICT systems may be used for both work-related and for sole personal use, the governance
expects use of this equipment for any purpose to be appropriate, courteous and consistent with
the expectations of governance at all times.
This policy document is issued to all staff before they are provided with laptops, tablets, cameras,
USB / portable hard drive devices, mobile phones and passwords giving access to the ICT network.
Policy coverage
This policy covers the use by staff of any issued ICT and communications equipment, examples of
which include:
25
The policy covers the use of all ICT and communications equipment provided for work purposes
and equipment which is on loan to staff for their sole personal use.
Any equipment provided to a member of staff is provided for their sole personal use. Use of the
equipment by family or friends is not permitted and any misuse of the equipment by unauthorised
users will be the responsibility of the staff member.
Whilst it is not possible to cover all eventualities, the following information is published to guide staff
on the expectations of governance. Any breaches of this policy or operation of issued equipment
outside statutory legal compliance may be grounds for disciplinary action being taken.
26
1. To make, to gain access to, or for the publication and distribution of inappropriate sexual
material, including text and / or images, or other material that would tend to deprave or
corrupt those likely to read or see it;
2. To make, to gain access to, and / or for the publication and distribution of material promoting
homophobia or racial or religious hatred;
4. For the publication and / or distribution of libellous statements or material which defames or
degrades others;
5. For the publication of material that defames, denigrates or brings into disrepute the
organisation and / or its staff and pupils;
6. For the publication and distribution of personal data without authorisation, consent or
justification;
10. To gain unauthorised access to internal or external computer systems (commonly known as
hacking);
11. To create or deliberately distribute ICT or communications systems ‘malware’, including viruses,
worms, etc;
12. To record or monitor telephone or e-mail communications without the express approval of
governance. In no case will such recording or monitoring be permitted unless it has been
established for that such action is in full compliance with all relevant legislation and regulations.
(Regulation of Investigatory Powers Act 2000 – ‘Ancillary to their provision of ICT facilities the
Governing Body asserts the employer’s right to monitor and inspect the use by staff of any computer
(including e-mails) or telephonic communications systems and will do so where there are grounds
for suspecting that such facilities are being, or may have been, misused.’)
13. To enable or assist others to breach governance expectations as set out in this policy.
14. Additionally, the following uses of our ICT facilities are not permitted and could lead to
disciplinary action being taken:
◦ For participation in ‘chain’ e-mail correspondence (including forwarding hoax virus warnings);
27
Note: The above restrictions apply to the use of phones, e-mails, text messaging, internet chat
rooms, blogs, and personal websites (including personal entries on social networks e.g. MySpace,
Facebook, Twitter, Instagram etc).Policy and Guidance on <INSERT NAME OF SCHOOL/ ACADEMY>
use of ICT and Communications Systems
All employees, supply agency staff and, where appropriate, consultants, multi-agency staff, visitors,
contractors, students and volunteers are required to familiarise themselves with the contents of
the policy on the use of ICT systems and sign the following declaration.
Declaration
You should sign two copies of this document; this copy to be retained by you. The second copy is
to be detached and will be placed in your personnel file.
I confirm that I have been provided with a copy of the policy and guidelines on the use of the
issued ICT and communications systems and I agree to the terms and conditions specified therein.
I confirm that I am aware that all my electronic communications including emails and website
searches may be monitored and that this applies if I am working from home on issued equipment
or networks.
Policy and Guidance on <INSERT NAME OF SCHOOL/ ACADEMY> use of ICT and Communications
Systems
All employees, supply agency staff and, where appropriate, consultants, multi-agency staff, visitors,
contractors, students and volunteers are required to familiarise themselves with the contents of
the policy on the use of ICT systems and sign the following declaration.
You should sign two copies of this document; this copy will be retained in your personnel file.
I confirm that I have been provided with a copy of the policy and guidance on the use of ICT and
28
29