Safeguarding: online threats and safety
Scope
• Many of the key safeguarding challenges
faced by learners either occur online or are
amplified in a variety of online situations
•Some safeguarding challenges may be
mitigated online
•Online threats to safety will arise within and
without the learning setting
•Statutory safeguarding guidance and OfSTED
inspection framework highlight online safety
Specified safeguarding issues
• child sexual exploitation (CSE)
• bullying /cyberbullying
• domestic violence
• drugs
• fabricated or induced illness
• faith abuse
• female genital mutilation
• forced marriage
• challenging family
circumstances
• honour based violence
• homelessness
• initiation/hazing type violence
and rituals
• serious crime
• breast ironing
• gangs and youth violence
• child criminal exploitation:
county lines
• gender-based violence
• mental health
• private fostering
• radicalisation
• sexting
• teenage relationship abuse:
peer on peer
• modern slavery and
trafficking
• upskirting
Safeguarding goal
• To empower learners to navigate their way
through the virtual and online worlds in ways
that are informed, beneficial, confident and
safe
• As many of our learners are now studying at
home and online, this assumes even greater
importance than usual
Statutory guidance
• As schools and colleges increasingly work online,
it is essential that learners are safeguarded from
potentially harmful and inappropriate online
material. As such, governing bodies and
proprietors should ensure appropriate filters and
appropriate monitoring systems are in place.
Additional information to support governing
bodies and proprietors keep their children safe
online is provided in Annex C (KCSIE 2019)
Statutory guidance: annex C
• Content: being exposed to illegal, inappropriate
or harmful material: for example fake news,
racist, radical and extremist views
• Contact: being subjected to harmful online
interaction with other users: for example
commercial advertising as well as adults posing
as children or young adults: and
• Conduct: personal online behaviour that
increases the likelihood of, or causes, harm: for
example making, sending and receiving explicit
images, or online bullying
Statutory guidance: IT system filters
• Providers’ IT systems should use appropriate filters and
monitoring systems in order to identify access to inappropriate
sites and content
• The use/choice of filters should be informed partly by Prevent
Duty risk assessment
• Prevent Guidance: providers are required to ensure learners are
safe from terrorist and extremist material when accessing the
internet in school/college by establishing appropriate levels of
filtering
• KCSIE: providers must ensure learners should not be able to access
harmful or inappropriate material from their IT system. However,
providers will need to be careful that “over-blocking” does not
lead to unreasonable restrictions as to what learners can be
taught with regards to online teaching and safeguarding
Inappropriate content - filters
CONTENT EXPLANATION
Discrimination Promotes unjust or prejudicial treatment of people with
protected characteristics of the Equality Act 2010
Drugs/substance
misuse
Displays or promotes the illegal use of drugs or substances
Extremism Promotes terrorism and terrorist ideologies, violence or
intolerance
Malware/hacking Promotes the compromising of systems including anonymous
browsing and other filter bypass tools as well as sites hosting
malicious content
Pornography Displays sexual acts or explicit images
Self-harm Promotes or displays deliberate self harm including suicide and
eating disorders
Violence Displays or promotes use of physical force intended to hurt or kill
Filter system features
Age-appropriate, differentiated filtering Ability to vary filtering by age and role
Circumvention – identify /manage
techniques that circumvent your system
VPN, proxy services etc
Control User able to control filter and to permit
or deny access to specific content
Group/site management Deployment consistently across multiple
sites with central oversight
Identification Capacity to identify users / terminals
Multiple language support Capacity to manage relevant languages
Reporting Capacity to report inappropriate content
being accessed so it can be blocked
Reports Provides clear historical information on
the websites visited by your users
Statutory guidance: IT system filters
• Use of IT system filters and the information it
provides should be covered and cross- referred to
in your organisation’s Privacy/GDPR policy
• What would you do if your filtering system
identified that a network user had typed into the
browser one after the other:
House of Commons
How to make a nuclear explosive ?
Statutory guidance: IT system filters
• Guidance on filtering can be accessed on:
UK Safer Internet Centre: appropriate filtering and
monitoring
And from the
National Education Network
Deciphering language used online
RUMORF LMIRL WTGP ASL PIR
POS PAL KPC ROFL 420
8 BMS MERK GOT FOOD
YOLO SKET Any more? Any more? Any more?
Deciphering language used online
RUMORF
Are you male
or female?
LMIRL
Lets meet in
real life
WTGP
Want to go
private?
ASL
Age sex
location
PIR
Parent in
room
POS
Parent over
shoulder
PAL
Parents are
listening
KPC
Keep
parents
clueless
ROFL
Rolling on
floor
laughing
420
Marijuana
8
Oral sex
BMS
Baby making
sex
MERK
Murder or
kill
GOT
Going out of
town
FOOD
Drugs
YOLO
You only live
once
SKET
Slut
Any more? Any more? Any more?
Meeting people online
Getting home from work WonderWoman logged on. She checked her buddy list and saw that
GoTo123 was online. She sent him a message and he replied:
1. WonderWoman:
I’m glad you are there.
I think someone was
following me home.
Really weird!!
2. GoTo123:
LOL. Why would anyone
follow you? Don’t you
live in a safe area?
3. WonderWoman:
I do. Safe & boring! I
must be imagining
things. I couldn’t see
anyone when I looked
4. GoTo123:
Unless you gave your
name out online – you
haven’t done that have
you?
5. WonderWoman:
No!!! I am not daft!!
6. GoTo123:
Did you have football
today?
7. WonderWoman:
Yes. We won! Of course!
We will win the league –
no question
8. GoTo123:
Great. Who did you play?
9. WonderWoman:
We played the usual
local lot. Their outfits
are so gross! They
look like bees
10. GoTo123:
What’s your team called
again?
11. WonderWoman:
The Valley Cats. That’s
why we have the kittens
on our shirts. It’s the
under 17s.
12. GoTo123
Did you score?
13. WonderWoman:
Thankfully NO!! I am
in goal. Disaster if I did
– I’m number 7
14. GoTo123:
Goalkeepers are always
underestimated. 7 is my
lucky number
15. WonderWoman:
I have to go – got to cook
dinner for my mum when
she gets home. Bye!
16. GoTo123:
Speak later. Take care.
LMIRL. Bye
Meeting people online
Ashleigh Hall was 16 and a learner at her local FE college. She was popular and had
over 400 friends on Facebook. One autumn she added a handsome bare-chested 17
year old boy to her list of friends. He called himself Peter Cartwright. Ashleigh was
one of 173 people, mostly young women, to accept him as an online friend. She
added him to other networking sites and began to chat with him regularly.
One month later “Cartwright” enticed Ashleigh to meet him in person. She packed
an overnight bag and told her mother she was staying overnight with a girlfriend.
“Cartwright” texted Ashleigh to say that he was playing football and that his dad
would pick her up at the station and bring her to the house. This was followed by
another text from the “father” from another phone.
Within hours Ashleigh had been raped and killed. Her body was dumped in a field.
Peter Cartwright and his father never existed. The fake Facebook profile was created
by convicted sex offender Peter Chapman. He was subsequently arrested and
sentenced to 35 years in jail
Meeting people online
Ashleigh’s college friends created a set of rules to help keep young people safe as
they met people online: They are called Ashleigh’s Rules.
• If you meet someone in real life who you have only met
previously online, take some friends with you
• When you meet them in real life meet in a public, well lit place
• Tell a friend the name of the person you are meeting, where you
are going and when you will be back. They should alert someone
if you do not return on time
• Arrange to call a friend during your real life meeting to confirm
you are ok. Your friend should alert someone if you do not call
• Never accept anyone on social networking sites you don’t know
• Never trust anyone you have only met online
• Never tell a stranger online anything personal about yourself, like
your date of birth or where you live
Sexting – the law
• The sharing online of intimate photographs – with or without consent
• Protection of Children Act 1978, Chapter 37 as amended by sect 45 of the
Sexual Offences Act 2003 creates the following offences:
• a) to take, permit to be taken, or to make any indecent photograph, or pseudo-
photograph of a child:
• b) to distribute or show such indecent photographs or pseudo-photographs
• c) to have in his possession such indecent photographs or pseudo-photographs
with a view to their being distributed or shown by himself or others
• Applies to all under 18s
• It's not a crime to send intimate images or videos of yourself privately to
another person if both are consenting adults. It's a crime to show intimate
images or videos, send them to another person, upload them to a website, or
threaten to do this, without consent.
• Circumstances and motive are irrelevant to the question of indecency
• An image on the internet has no natural lifespan
• A prosecution for any of these offences can place the offender on the sex
offenders’ register for a period commensurate with their sentence – times may
be reduced for under 18s
Sexting
• First time offenders may not always face prosecution, although authorities will
wish to ensure that any young people involved are safe
• CEOP urges a balance be struck between a criminal justice approach and an
educational and safeguarding approach
• Children and young people obviously have a natural and healthy propensity to
experiment with and explore their developing sexuality. This can include taking
and sharing explicit photographs
• The reasons why children and young people post sexual images of themselves
will vary
• Children and young people creating indecent images of themselves may be an
indicator of other underlying vulnerabilities and risks
• Some self-taken indecent images will be as a result of grooming and facilitation
by adult offenders
• Chief Police Officers do not support the prosecution or criminalisation of
children for taking indecent images of themselves and sharing them
• They support a safeguarding approach being at the heart of any intervention –
the welfare of the child should be paramount
Sexting – curriculum intervention
• Learners need to understand the legal position
• They also need to understand the risks of sexting – personal and
professional
• Given that very many young people are and are likely to continue
sexting, the safeguarding curriculum challenge is to deliver
curriculum content that enables learners to make informed
choices about whether, what and with whom to share -
empowerment rather than prohibition
• CEOP resources
• Practical strategies
• Encouragement to report problems arising from sexting to
Designated Safeguarding Officers
Prevent - radicalisation
• Much radicalisation occurs and/or has a significant element of
online content and contact
• Filtering of provider systems should pick up key words and the
accessing of the websites and email addresses of
proscribed/banned organisations
• Examples of online material of concern include:
• Articles, images, speeches or videos that promote terrorism or
encourage violence
• Content encouraging people to commit acts of terrorism
• Websites made by terrorist or extremist organisations
• Videos of terrorist attacks
• These can be reported to: https://www.gov.uk/report-terrorism
• The Government publishes a list of proscribed organisations.
These can be found on:
https://www.gov.uk/government/publications/proscribed-terror-
groups-ororganisations--2
Radicalisation – grooming – critical thinking
• Grooming describes the process by which radicalisers and sexual
abusers draw unsuspecting individuals into a relationship of trust
from which their actions can be manipulated
• The groomer has a medium to long-term plan for the individual
being groomed
• The individual being groomed is unaware of the grooming plan,
experiencing it only in consecutive “baby steps”
• If the individual being groomed knew of the groomer’s plan it
would cease to have any power
• The safeguarding curriculum challenge is to deliver curriculum
content that enables learners to recognise the features of
grooming and to report them to DSOs
• In the case of radicalising grooming the challenge is to support
learners to critique content they may come across – the
development of critical thinking
Radicalisation – grooming – critical thinking
1
Manipulating
2
Respecting
3
Pressuring
4
Threatening
5
Isolating
6
Pretending to
have “special
knowledge”
7
Being a true
friend
8
Forcing a
decision to be
made now
9
Encouraging
the target to
ask questions
10
Seeming to
have all the
answers
11
Being kind
12
Having a sense
of humour
13
Making the
target feel
guilty
14
Being willing to
change their
mind
15
Being
completely
upfront
16
Not being
completely
upfront
17
Providing
evidence for
their
arguments
18
Not providing
evidence for
their
arguments
???? ???
Radicalisation – critical questioning
Develop questions that can always be asked of online contact/
content:
• What is the evidence for this?
• What happens to me if things go wrong?
• Why don’t you respect me?
• Why can’t I say “no” and still be friends with you?
• What are the arguments against this?
• What is the organisation you belong to called?
• Why shouldn’t I tell my family and friends about this?
• What would you do if I told the police about this?
• Any others?
Learners can choose their five favourite questions, drawing from
their own and those of others- and keep them as the set of
questions they will always ask
Radicalisation – critical thinking – what is evidence?
• Going back to the grid of radicalising behaviours – take a
scenario and for each of the points identify examples /
evidence for their presence or non – presence
• Explore what the work “evidence” means:
• Someone’s made up story?
• A joke?
• A poem?
• Provable information that supports an argument
• Information that comes from more than one source
• Facts that give you a reason for something
• Look at the circulated case study:
• What could have you done prior to the events happening to
help avoid them and keep yourself safe?
• What could you have done once the events had occurred or as
they were occurring?
• What should your organisation have done proactively to help
prevent situations such as these occurring?
• What should your organisation do once the situations have
occurred?
Safeguarding staff
Online Safety for Learners

More Related Content

PPTX
Your Internet Safety
PPTX
2010-07-28 Can You See Me Now?
PPTX
E Safety Powerpoint TMWS
PPTX
Online defamation
DOCX
Censorship essay (2)
PPTX
Defamation on the Internet
PDF
2012 06 Sexting and Cyberbullying
PPTX
Internet Defamation
Your Internet Safety
2010-07-28 Can You See Me Now?
E Safety Powerpoint TMWS
Online defamation
Censorship essay (2)
Defamation on the Internet
2012 06 Sexting and Cyberbullying
Internet Defamation

What's hot (20)

DOCX
Is censorship a good or bad idea?
PPT
Internet safety
PPTX
Cyberbullying- Assignment 8
PPTX
Social media and inappropriate behaviour
PPTX
2010-09-09 The World-Wide Bathroom Wall
PPTX
Cyber Bullying
PPTX
2010-10-29 Can You See Me Now?
PPTX
Teens: Cyberbullying, Sexting And Your Internet Presence
PPTX
Cyberbullying
PPT
Kyle Cyber Bullying
PPT
Michigan Law: Domestic Violence & PPO
PPTX
Cyber Bullying
PPT
Benefits Of On Line Social Networks (Tin180.com)
PPT
Internet Safety
PPTX
Cyberbullying and Internet Addiction
PPT
Invisible Preadators: Hidden Dangers of the Internet
DOCX
© Houghton mifflin harcour
PDF
Digital Citizenship
PPTX
Cyber bullying
PPTX
Social Networks and Cyberbullying: Implications for Students and Teachers
Is censorship a good or bad idea?
Internet safety
Cyberbullying- Assignment 8
Social media and inappropriate behaviour
2010-09-09 The World-Wide Bathroom Wall
Cyber Bullying
2010-10-29 Can You See Me Now?
Teens: Cyberbullying, Sexting And Your Internet Presence
Cyberbullying
Kyle Cyber Bullying
Michigan Law: Domestic Violence & PPO
Cyber Bullying
Benefits Of On Line Social Networks (Tin180.com)
Internet Safety
Cyberbullying and Internet Addiction
Invisible Preadators: Hidden Dangers of the Internet
© Houghton mifflin harcour
Digital Citizenship
Cyber bullying
Social Networks and Cyberbullying: Implications for Students and Teachers
Ad

Similar to Online Safety for Learners (20)

PPTX
Children-safety-online-Presentation.pptx
PPT
Internet safety presentation
PPT
Internet safety presentation
PPT
Bullying presentation
PPTX
Internet safety presentation 2019
PPTX
September 2014 cyber safety presentation
PPT
Playing safe
PPTX
E safety parents eve
PPT
Legalissues
PPT
Safe Surfing 4Paras/Clerical Feb 07
PPT
Cyber bullying presentation
PDF
Internet safety: Myth or Achievable Goal?
PPT
CyberSafety
PPT
Playing It Safe On The Web Updated08
PPTX
Internet Safety Presentation
PPT
East Lothian June Internet Safety Talks Slideshare
PPTX
Internet safety presentation 2016
PPT
E safety training ~ what ofsted are looking for by stephen carrick-davies
PPTX
Internet Safety for Parents presentation 2017
PPTX
What administrators should_know_about_cyberspace_misconduct
Children-safety-online-Presentation.pptx
Internet safety presentation
Internet safety presentation
Bullying presentation
Internet safety presentation 2019
September 2014 cyber safety presentation
Playing safe
E safety parents eve
Legalissues
Safe Surfing 4Paras/Clerical Feb 07
Cyber bullying presentation
Internet safety: Myth or Achievable Goal?
CyberSafety
Playing It Safe On The Web Updated08
Internet Safety Presentation
East Lothian June Internet Safety Talks Slideshare
Internet safety presentation 2016
E safety training ~ what ofsted are looking for by stephen carrick-davies
Internet Safety for Parents presentation 2017
What administrators should_know_about_cyberspace_misconduct
Ad

More from The Pathway Group (20)

PPTX
Presentation by Safaraz Ali on Role Model .pptx
PDF
Manifesto for Manufacturing 2024 UK Manufacturers
PPTX
Transform or Transact by Safaraz Ali
PPTX
Transform or Transanct by Safaraz Ali.pptx
PPTX
Effective Governance for Independent Training Providers -July 2024.pptx
PPTX
Responsible Individual Training - F5 Foster Care. RI Foster Care Training, R...
PDF
Apprenticeship Branding Conference - Brochure powered by Pathway Group
PPTX
Talk to us - Safaraz Ali for linkedin.pptx
PPTX
Responsible Individual - RI Training for Foster Care agencies - F5 Foster Car...
PPTX
Responsible Individual Training fostercare- F5 Foster Care UK
PDF
Pathway Group 2024 by Safaraz Ali.pdf
PDF
1973 Toyota Production System Handbook
PDF
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
PDF
Empowering The Nation - White Paper .pdf
PDF
Peer Meetup by Safaraz Ali 13.Oct.2023.pdf
PPTX
Peer Meetup by Safaraz Ali 13.Oct.2023.ppt
PDF
A Guide to Apprenticeships for the Higher Education Sector.pdf
PDF
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
PPTX
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
PDF
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...
Presentation by Safaraz Ali on Role Model .pptx
Manifesto for Manufacturing 2024 UK Manufacturers
Transform or Transact by Safaraz Ali
Transform or Transanct by Safaraz Ali.pptx
Effective Governance for Independent Training Providers -July 2024.pptx
Responsible Individual Training - F5 Foster Care. RI Foster Care Training, R...
Apprenticeship Branding Conference - Brochure powered by Pathway Group
Talk to us - Safaraz Ali for linkedin.pptx
Responsible Individual - RI Training for Foster Care agencies - F5 Foster Car...
Responsible Individual Training fostercare- F5 Foster Care UK
Pathway Group 2024 by Safaraz Ali.pdf
1973 Toyota Production System Handbook
Multicultural-Apprenticeship-Awards-2023-Compressed-Brochure.pdf
Empowering The Nation - White Paper .pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.pdf
Peer Meetup by Safaraz Ali 13.Oct.2023.ppt
A Guide to Apprenticeships for the Higher Education Sector.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.pdf
All Matters Regulatory - Apprenticeship Training Material - Pathway Group.ppt
End-Point Assessment Organisations EPAOs - Apprenticeship Training Material -...

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
What’s under the hood: Parsing standardized learning content for AI
PPTX
Module on health assessment of CHN. pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
semiconductor packaging in vlsi design fab
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Journal of Dental Science - UDMY (2021).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Virtual and Augmented Reality in Current Scenario
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Share_Module_2_Power_conflict_and_negotiation.pptx
What’s under the hood: Parsing standardized learning content for AI
Module on health assessment of CHN. pptx
What if we spent less time fighting change, and more time building what’s rig...
semiconductor packaging in vlsi design fab
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Core Concepts of Personalized Learning and Virtual Learning Environments
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Journal of Dental Science - UDMY (2021).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Empowerment Technology for Senior High School Guide
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Virtual and Augmented Reality in Current Scenario

Online Safety for Learners

  • 2. Scope • Many of the key safeguarding challenges faced by learners either occur online or are amplified in a variety of online situations •Some safeguarding challenges may be mitigated online •Online threats to safety will arise within and without the learning setting •Statutory safeguarding guidance and OfSTED inspection framework highlight online safety
  • 3. Specified safeguarding issues • child sexual exploitation (CSE) • bullying /cyberbullying • domestic violence • drugs • fabricated or induced illness • faith abuse • female genital mutilation • forced marriage • challenging family circumstances • honour based violence • homelessness • initiation/hazing type violence and rituals • serious crime • breast ironing • gangs and youth violence • child criminal exploitation: county lines • gender-based violence • mental health • private fostering • radicalisation • sexting • teenage relationship abuse: peer on peer • modern slavery and trafficking • upskirting
  • 4. Safeguarding goal • To empower learners to navigate their way through the virtual and online worlds in ways that are informed, beneficial, confident and safe • As many of our learners are now studying at home and online, this assumes even greater importance than usual
  • 5. Statutory guidance • As schools and colleges increasingly work online, it is essential that learners are safeguarded from potentially harmful and inappropriate online material. As such, governing bodies and proprietors should ensure appropriate filters and appropriate monitoring systems are in place. Additional information to support governing bodies and proprietors keep their children safe online is provided in Annex C (KCSIE 2019)
  • 6. Statutory guidance: annex C • Content: being exposed to illegal, inappropriate or harmful material: for example fake news, racist, radical and extremist views • Contact: being subjected to harmful online interaction with other users: for example commercial advertising as well as adults posing as children or young adults: and • Conduct: personal online behaviour that increases the likelihood of, or causes, harm: for example making, sending and receiving explicit images, or online bullying
  • 7. Statutory guidance: IT system filters • Providers’ IT systems should use appropriate filters and monitoring systems in order to identify access to inappropriate sites and content • The use/choice of filters should be informed partly by Prevent Duty risk assessment • Prevent Guidance: providers are required to ensure learners are safe from terrorist and extremist material when accessing the internet in school/college by establishing appropriate levels of filtering • KCSIE: providers must ensure learners should not be able to access harmful or inappropriate material from their IT system. However, providers will need to be careful that “over-blocking” does not lead to unreasonable restrictions as to what learners can be taught with regards to online teaching and safeguarding
  • 8. Inappropriate content - filters CONTENT EXPLANATION Discrimination Promotes unjust or prejudicial treatment of people with protected characteristics of the Equality Act 2010 Drugs/substance misuse Displays or promotes the illegal use of drugs or substances Extremism Promotes terrorism and terrorist ideologies, violence or intolerance Malware/hacking Promotes the compromising of systems including anonymous browsing and other filter bypass tools as well as sites hosting malicious content Pornography Displays sexual acts or explicit images Self-harm Promotes or displays deliberate self harm including suicide and eating disorders Violence Displays or promotes use of physical force intended to hurt or kill
  • 9. Filter system features Age-appropriate, differentiated filtering Ability to vary filtering by age and role Circumvention – identify /manage techniques that circumvent your system VPN, proxy services etc Control User able to control filter and to permit or deny access to specific content Group/site management Deployment consistently across multiple sites with central oversight Identification Capacity to identify users / terminals Multiple language support Capacity to manage relevant languages Reporting Capacity to report inappropriate content being accessed so it can be blocked Reports Provides clear historical information on the websites visited by your users
  • 10. Statutory guidance: IT system filters • Use of IT system filters and the information it provides should be covered and cross- referred to in your organisation’s Privacy/GDPR policy • What would you do if your filtering system identified that a network user had typed into the browser one after the other: House of Commons How to make a nuclear explosive ?
  • 11. Statutory guidance: IT system filters • Guidance on filtering can be accessed on: UK Safer Internet Centre: appropriate filtering and monitoring And from the National Education Network
  • 12. Deciphering language used online RUMORF LMIRL WTGP ASL PIR POS PAL KPC ROFL 420 8 BMS MERK GOT FOOD YOLO SKET Any more? Any more? Any more?
  • 13. Deciphering language used online RUMORF Are you male or female? LMIRL Lets meet in real life WTGP Want to go private? ASL Age sex location PIR Parent in room POS Parent over shoulder PAL Parents are listening KPC Keep parents clueless ROFL Rolling on floor laughing 420 Marijuana 8 Oral sex BMS Baby making sex MERK Murder or kill GOT Going out of town FOOD Drugs YOLO You only live once SKET Slut Any more? Any more? Any more?
  • 14. Meeting people online Getting home from work WonderWoman logged on. She checked her buddy list and saw that GoTo123 was online. She sent him a message and he replied: 1. WonderWoman: I’m glad you are there. I think someone was following me home. Really weird!! 2. GoTo123: LOL. Why would anyone follow you? Don’t you live in a safe area? 3. WonderWoman: I do. Safe & boring! I must be imagining things. I couldn’t see anyone when I looked 4. GoTo123: Unless you gave your name out online – you haven’t done that have you? 5. WonderWoman: No!!! I am not daft!! 6. GoTo123: Did you have football today? 7. WonderWoman: Yes. We won! Of course! We will win the league – no question 8. GoTo123: Great. Who did you play? 9. WonderWoman: We played the usual local lot. Their outfits are so gross! They look like bees 10. GoTo123: What’s your team called again? 11. WonderWoman: The Valley Cats. That’s why we have the kittens on our shirts. It’s the under 17s. 12. GoTo123 Did you score? 13. WonderWoman: Thankfully NO!! I am in goal. Disaster if I did – I’m number 7 14. GoTo123: Goalkeepers are always underestimated. 7 is my lucky number 15. WonderWoman: I have to go – got to cook dinner for my mum when she gets home. Bye! 16. GoTo123: Speak later. Take care. LMIRL. Bye
  • 15. Meeting people online Ashleigh Hall was 16 and a learner at her local FE college. She was popular and had over 400 friends on Facebook. One autumn she added a handsome bare-chested 17 year old boy to her list of friends. He called himself Peter Cartwright. Ashleigh was one of 173 people, mostly young women, to accept him as an online friend. She added him to other networking sites and began to chat with him regularly. One month later “Cartwright” enticed Ashleigh to meet him in person. She packed an overnight bag and told her mother she was staying overnight with a girlfriend. “Cartwright” texted Ashleigh to say that he was playing football and that his dad would pick her up at the station and bring her to the house. This was followed by another text from the “father” from another phone. Within hours Ashleigh had been raped and killed. Her body was dumped in a field. Peter Cartwright and his father never existed. The fake Facebook profile was created by convicted sex offender Peter Chapman. He was subsequently arrested and sentenced to 35 years in jail
  • 16. Meeting people online Ashleigh’s college friends created a set of rules to help keep young people safe as they met people online: They are called Ashleigh’s Rules. • If you meet someone in real life who you have only met previously online, take some friends with you • When you meet them in real life meet in a public, well lit place • Tell a friend the name of the person you are meeting, where you are going and when you will be back. They should alert someone if you do not return on time • Arrange to call a friend during your real life meeting to confirm you are ok. Your friend should alert someone if you do not call • Never accept anyone on social networking sites you don’t know • Never trust anyone you have only met online • Never tell a stranger online anything personal about yourself, like your date of birth or where you live
  • 17. Sexting – the law • The sharing online of intimate photographs – with or without consent • Protection of Children Act 1978, Chapter 37 as amended by sect 45 of the Sexual Offences Act 2003 creates the following offences: • a) to take, permit to be taken, or to make any indecent photograph, or pseudo- photograph of a child: • b) to distribute or show such indecent photographs or pseudo-photographs • c) to have in his possession such indecent photographs or pseudo-photographs with a view to their being distributed or shown by himself or others • Applies to all under 18s • It's not a crime to send intimate images or videos of yourself privately to another person if both are consenting adults. It's a crime to show intimate images or videos, send them to another person, upload them to a website, or threaten to do this, without consent. • Circumstances and motive are irrelevant to the question of indecency • An image on the internet has no natural lifespan • A prosecution for any of these offences can place the offender on the sex offenders’ register for a period commensurate with their sentence – times may be reduced for under 18s
  • 18. Sexting • First time offenders may not always face prosecution, although authorities will wish to ensure that any young people involved are safe • CEOP urges a balance be struck between a criminal justice approach and an educational and safeguarding approach • Children and young people obviously have a natural and healthy propensity to experiment with and explore their developing sexuality. This can include taking and sharing explicit photographs • The reasons why children and young people post sexual images of themselves will vary • Children and young people creating indecent images of themselves may be an indicator of other underlying vulnerabilities and risks • Some self-taken indecent images will be as a result of grooming and facilitation by adult offenders • Chief Police Officers do not support the prosecution or criminalisation of children for taking indecent images of themselves and sharing them • They support a safeguarding approach being at the heart of any intervention – the welfare of the child should be paramount
  • 19. Sexting – curriculum intervention • Learners need to understand the legal position • They also need to understand the risks of sexting – personal and professional • Given that very many young people are and are likely to continue sexting, the safeguarding curriculum challenge is to deliver curriculum content that enables learners to make informed choices about whether, what and with whom to share - empowerment rather than prohibition • CEOP resources • Practical strategies • Encouragement to report problems arising from sexting to Designated Safeguarding Officers
  • 20. Prevent - radicalisation • Much radicalisation occurs and/or has a significant element of online content and contact • Filtering of provider systems should pick up key words and the accessing of the websites and email addresses of proscribed/banned organisations • Examples of online material of concern include: • Articles, images, speeches or videos that promote terrorism or encourage violence • Content encouraging people to commit acts of terrorism • Websites made by terrorist or extremist organisations • Videos of terrorist attacks • These can be reported to: https://www.gov.uk/report-terrorism • The Government publishes a list of proscribed organisations. These can be found on: https://www.gov.uk/government/publications/proscribed-terror- groups-ororganisations--2
  • 21. Radicalisation – grooming – critical thinking • Grooming describes the process by which radicalisers and sexual abusers draw unsuspecting individuals into a relationship of trust from which their actions can be manipulated • The groomer has a medium to long-term plan for the individual being groomed • The individual being groomed is unaware of the grooming plan, experiencing it only in consecutive “baby steps” • If the individual being groomed knew of the groomer’s plan it would cease to have any power • The safeguarding curriculum challenge is to deliver curriculum content that enables learners to recognise the features of grooming and to report them to DSOs • In the case of radicalising grooming the challenge is to support learners to critique content they may come across – the development of critical thinking
  • 22. Radicalisation – grooming – critical thinking 1 Manipulating 2 Respecting 3 Pressuring 4 Threatening 5 Isolating 6 Pretending to have “special knowledge” 7 Being a true friend 8 Forcing a decision to be made now 9 Encouraging the target to ask questions 10 Seeming to have all the answers 11 Being kind 12 Having a sense of humour 13 Making the target feel guilty 14 Being willing to change their mind 15 Being completely upfront 16 Not being completely upfront 17 Providing evidence for their arguments 18 Not providing evidence for their arguments ???? ???
  • 23. Radicalisation – critical questioning Develop questions that can always be asked of online contact/ content: • What is the evidence for this? • What happens to me if things go wrong? • Why don’t you respect me? • Why can’t I say “no” and still be friends with you? • What are the arguments against this? • What is the organisation you belong to called? • Why shouldn’t I tell my family and friends about this? • What would you do if I told the police about this? • Any others? Learners can choose their five favourite questions, drawing from their own and those of others- and keep them as the set of questions they will always ask
  • 24. Radicalisation – critical thinking – what is evidence? • Going back to the grid of radicalising behaviours – take a scenario and for each of the points identify examples / evidence for their presence or non – presence • Explore what the work “evidence” means: • Someone’s made up story? • A joke? • A poem? • Provable information that supports an argument • Information that comes from more than one source • Facts that give you a reason for something
  • 25. • Look at the circulated case study: • What could have you done prior to the events happening to help avoid them and keep yourself safe? • What could you have done once the events had occurred or as they were occurring? • What should your organisation have done proactively to help prevent situations such as these occurring? • What should your organisation do once the situations have occurred? Safeguarding staff