Roselyn House School
E-Safety may be described as the school’s ability to:
- protect and educate pupils and staff in their use of
- have the appropriate mechanisms to intervene and support any incident where
The breadth of issues classified within e-safety is considerable, but can be categorised into
three areas of risk:
- content: being exposed to illegal, inappropriate or harmful
- contact: being subjected to harmful online interaction with other
- conduct: personal online behaviour that increases the likelihood of, or causes,
Examples given later
Why is Internet use important?
- The purpose of Internet use in school is to raise educational standards, to promote student achievement, to support the
professional work of staff and to enhance the school’s management information and business administration systems.
- Internet use is a part of the statutory curriculum and a necessary tool for staff, students and parents/
- Internet access is an entitlement for students who show a responsible and mature approach to its use.
- The Internet is available to support communication internally and externally.
- The Internet is an essential element in 21st century life for education, business and social
interaction. The school has a duty to provide students with quality Internet access as part of their learning experience.
How does the Internet benefit education?
Benefits of using the Internet in education include:
- Access to worldwide educational resources including museums and art galleries;
- Inclusion in government initiatives such as the DfE ICT in Schools and the Virtual Teacher Centre (VTC) http://vtc.ngfl.gov.uk;
- Educational and cultural exchanges between students worldwide;
- Cultural, vocational, social and leisure use in libraries, clubs and at home;
- Access to experts in many fields for students and staff;
- Staff professional development through access to national developments, educational materials and good curriculum
- Communication with support services, professional associations and colleagues.
- Improved access to technical support including remote management of networks;
- Exchange of curriculum and administration data with the LEAs and DFE.
- Mentoring of students and provide peer support for them and teachers
How can Internet use enhance learning?
- The school Internet access will be designed expressly for student use and will include filtering appropriate to the age
- Students will be taught what Internet use is acceptable and what is not and given clear objectives for Internet
- Internet access will be planned to enrich and extend learning activities. Access levels will be reviewed to reflect the
curriculum requirements and age of students.
- Staff should guide students in on-line activities that will support the learning outcomes planned for the students’ age
- Students will be educated in the effective use of the Internet in research, including the skills of knowledge location,
retrieval and evaluation.
How will students learn to evaluate Internet content?
- If staff or students discover unsuitable sites, the URL (address) and content must be reported to the Internet Service
Provider via the ICT Co-ordinator and/ or the Head Teacher or Deputy Head Teacher.
- Roselyn House School will ensure that the use of Internet derived materials by staff and by students complies with
- Students should be taught to be critically aware of the materials they read and shown how to
validate information before accepting its accuracy.
- Students will be taught to acknowledge the source of information used and to respect
copyright when using Internet material in their own work.
How will e-mail be managed?
- If they have a school email, students may only use approved e-mail accounts on the school system after permission has
- Students must immediately tell a staff member if they receive offensive e-mail.
- Students must not reveal details of themselves or others in e‑mail communication, such as address or telephone number, or
arrange to meet anyone.
- E-mail sent to an external organisation should be written carefully and authorised before sending, in the same way as a
letter written on school headed paper.
- The forwarding of chain letters is not permitted.
How should Web site content be managed?
- The point of contact on the Web site should be the school address, school e-mail and telephone number. Staff or students’
home information will not be published.
- Web site photographs that include students will be selected carefully and written permission from parents or carers will
be obtained before photographs of students are published on the school Web site.
- Students’ full names will not be used anywhere on the Web site, particularly in association with
- The Head Teacher, and/ or the Deputy Head Teacher will take overall editorial responsibility and ensure that content is
accurate and appropriate.
- The Web site should comply with the school's guidelines for publications.
- The copyright of all material must be held by the school, or be attributed to the owner where permission to reproduce has
Chat Rooms and social Media
- Students nor staff will not be allowed access to any kind of chat rooms.
- No students or staff will be permitted to use social media unless permission has been granted by parents/ carers
(students) and by the Headteacher or Deputy Headteacher.
See Social Media Policy
- Emerging technologies will be examined for educational benefit before use
in school is allowed.
- Mobile phones will not be used during lessons or formal school time
unless authorised or for educational purposes.
- The sending of abusive or inappropriate text messages is
- A risk assessment will be carried out before students are allowed to use
a new technology in school.
How will Internet access be authorised?
- The school will keep a record of all staff and students who are granted Internet access. The record will be kept
up-to-date, for instance a member of staff may leave or a student’s access be withdrawn.
- Our students must apply for Internet access individually by agreeing to abide by the Responsible Internet Use
- All students and staff who attend Roselyn House School must abide by the
Responsible Internet Use statement.
- Parents/ Carers will be asked to sign and return a consent form.
How will the risks be assessed?
- In common with other media such as magazines, books and video, some material available via the Internet is unsuitable for
students. The school will take all reasonable precautions to ensure that users access only appropriate material. However, due to the international scale and linked nature of Internet content,
it is not possible to guarantee that unsuitable material will never appear on a school computer. Roselyn House School cannot accept liability for the material accessed, or any consequences of
Internet access that is beyond the school’s current filtering system.
Other common risks include:
- exposure to inappropriate content, including online pornography; ignoring age ratings in games
(exposure to violence, often associated with racist language); and substance abuse
- lifestyle websites, for example pro-anorexia, self-harm or suicide
- hate sites
- content validation: how to check authenticity and accuracy of online
- cyber-bullying in all forms
- identity theft (including ‘frape’ (hacking Facebook profiles)) and sharing
- privacy issues, including disclosure of personal information
- digital footprint and online reputation
- health and well-being (amount of time spent online (internet or
- sexting (sending and receiving of personally intimate images) also referred to as SGII
(self-generated indecent images)- (any disclosure should follow Roselyn House School’s normal safeguarding practices and protocols. (“Sexting” in schools- advice and support around self generated
images- see parentsprotect.co.uk)
- copyright (little care or consideration for intellectual property and ownership – such as
music and film).
- The use of computer systems without permission or for inappropriate purposes could constitute a criminal offence under
the Computer Misuse Act 1990.
- Methods to identify, assess and minimise risks will be reviewed regularly.
- The Deputy Headteacher and Headteacher will ensure that the e-safety policy is implemented and compliance with the policy
- Why is this important? Technology offers unimaginable opportunities and is constantly
evolving. Access is currently becoming universal and increasingly more mobile, and pupils are using technology at an ever earlier age.
How will filtering be managed?
- Blocking strategies prevent access to a list of unsuitable sites or newsgroups. Maintenance of the blocking list is a
major task as new sites appear every day.
- A walled-garden or allow list provides access only to a list of approved sites. An allow list will inevitably restrict
students' access to a narrow range of information.
- Dynamic filtering examines the content of Web pages or e-mail for unsuitable words. Filtering of outgoing
information such as Web searches is also required.
- Rating systems give each Web page a rating for sexual, profane, violent or other unacceptable content. Web browsers can
be set to reject these pages.
- Monitoring records Internet sites visited by individual user. Access to a site forbidden by the filtering policy will
result in a report. It is also possible to remove access automatically after a set number of policy violations.
- The school will work in partnership with parents/ carers, the LEA, DFE and the Internet Service Provider to ensure
systems to protect students are reviewed and improved.
- If staff or students discover unsuitable sites, the URL (address) and content must be reported to the Internet Service
Provider via the ICT Co-ordinator.
- Senior staff and the ICT Co-ordinator will ensure that regular checks are made to ensure that the filtering methods
selected are appropriate, effective and reasonable.
- Any material that the school believes is illegal must be referred to the Internet Watch Foundation (please see references
- Filtering strategies will be selected by the school, in discussion with the filtering provider. The filtering strategy
will be selected to suit the age and curriculum requirements of the student.
How will the policy be introduced to students?
- Rules for Internet access and Responsible Internet Use will be posted in all rooms where computers are
- Students will be informed during induction and reminded regularly that Internet use will be monitored.
- Instruction in responsible and safe use should precede Internet access.
- Students will look at E-Safety within assemblies, workshops, within the wider curriculum including
- Roselyn House School will have open discussion with students about online safety so that “students learn to set personal
boundaries and feel more comfortable reporting incidents like bullying and harassment” (edudemic.com)
“Ensure students know that apps such as Facebook, Instagram and Snapchat collect data and keep
permanent records of all the information they collect. Even Snapchat, beloved for its disappearing messages, keeps unread messages on a server for 30 days. And some programs that open Snapchat
content outside of the app allow recipients to permanently save messages without the server knowing.” (edudemic April 2015)
How will staff be consulted?
All staff must accept the terms of the ‘Responsible Internet Use’ statement before using any Internet resource in
All staff including teachers, supply staff, learning support assistants and auxiliary staff, will be provided with the
School e-safety Policy of which they can also find on the school’s network.
Staff should be aware that Internet traffic can be monitored and traced to the individual user. Discretion and
professional conduct is essential.
The monitoring of Internet use is a sensitive matter. Staff who operate monitoring procedures should be supervised by
Staff development in safe and responsible Internet use and on the school e-safety policy will be provided as
How will ICT system security be maintained?
- Local Area Network security issues include:
- The user must act reasonably. Loading non-approved software could cause major problems. Good password practice is
required including logout after use.
- The workstation should be secure from casual mistakes by the user.
- Cabling should be secure and wireless LANs safe from interception.
- Servers must be located securely and physical access restricted.
- The server operating system must be secured to a high level.
- Virus protection for the whole network must be installed and current.
Wide Area Network (WAN) security issues
- The school ICT systems will be reviewed regularly with regard to security.
- Virus protection will be installed and updated regularly.
- Personal data sent over the Internet will be encrypted or otherwise secured.
- Use of portable media such as memory sticks and CD-ROMs will be reviewed. Portable media may not be brought into
school without specific permission from the ICT Co-ordinator and Head Teacher or Deputy Head Teacher and a virus check.
- Unapproved system utilities and executable files will not be allowed in students’ work areas or attached to
- Files held on the school’s network will be regularly checked.
- The ICT co-ordinator will ensure that the system has the capacity to take increased traffic caused by Internet
- All USB flash drives must be encrypted if they contain any confidential school content.
How will complaints regarding Internet use be handled?
- Responsibility for handling incidents will be delegated to senior members of staff.
- Any complaint about staff misuse must be referred to the Headteacher or Deputy Headteacher
- Students and parents/ carers will be informed of the complaints procedure.
- Parents/ carers and students will need to work in partnership with staff to resolve issues.
- As with drugs issues, there may be occasions when the police must be contacted. Early contact could be made to establish
the legal position and discuss strategies.
- Sanctions available include: interview/ counselling by the Headteacher or Deputy Headteacher or other Senior staff
informing parents/ carers, removal of Internet or computer access for a period, which could ultimately prevent access to files held on the system, including examination coursework.
How will parents’/ carers’ support be enlisted?
- Parents’/ Carers’ attention will be drawn to the School e-safety Policy in letters/ newsletters, the school prospectus
and on the school Web site.
- Internet issues will be handled sensitively to inform parents/ carers without undue alarm.
- A partnership approach with parents/ carers will be encouraged. This could include demonstrations, practical sessions and
suggestions for safe Internet use at home.
- Interested parents/ carers will be referred to organisations such as PIN, Parents Online and NCH Action for Children
(URLs in reference section).
- The following link is on the school website for all parents/ carers to register for e-safety support.
Internet Across the Community
- Adult users will need to agree by the acceptable use
- Parents/carers of children under 16 years of age will generally be
required to sign an acceptable use policy on behalf of the child.
- In libraries, generally children under 8 years of age must be accompanied
by an adult when accessing the Internet.
This policy should be read in conjunction with the Safeguarding Policy, Social Media Policy,
Electronic Information And Communications System Policy and Data Protection Policy (GDPR).
Reviewed: December 2019
Particularly for Parents/ Carers and
Keeping children safe in
For Schools and Colleges
National Action for Children (NCH)
Parents Guide on Internet usage
Advice for children, parents and schools
FKBKO- For Kids by Kids Online
Excellent Internet savvy for kids; KS1 to
Parents Information Network (PIN)
Comprehensive guidelines on Internet
Internet Safety Parents
UK Safer Internet
A guide for parents/ carers about potential dangers their children can face when using the
An internet safety site from Childnet, with low cost leaflets for
Think U Know?
Home Office site for students and parents explaining Internet
dangers and how to stay in control.
Family Guide Book (DfES recommended) www.familyguidebook.com
Parents Guide on Internet usage
NCH Action for Children
Expert advice for children, young people and parents/
Family guide to making Internet safe, fun and
Internet Watch Foundation
Reporting criminal online content
The following link provides access to a wide ranging glossary of
technological terms in current use: http://www.digizen.org/glossary/.
Notes on the legal
Many young people and indeed some staff use the
Internet regularly without being aware that some of the activities they take part in are potentially illegal. The law is developing rapidly and changes occur frequently. Please note this section is
designed to inform users of legal issues relevant to the use of communications, it is not professional advice.
Racial and Religious Hatred Act
This Act makes it a criminal offence to threaten people because of
their faith, or to stir up religious hatred by displaying, publishing or distributing written material which is threatening. Other laws already protect people from threats based on their race,
nationality or ethnic background.
Criminal Justice Act
Section 146 of the Criminal Justice Act 2003 came into effect in
April 2005, empowering courts to impose tougher sentences for offences motivated or aggravated by the victim's sexual orientation in England and Wales.
Sexual Offences Act
It is an offence to take, permit to be taken, make, possess, show,
distribute or advertise indecent images of children in the United Kingdom. A child for these purposes is anyone under the age of 18. Viewing an indecent image of a child on your computer means that
you have made a digital image. An image of a child also covers pseudo-photographs (digitally collated or otherwise). This can include images taken by and distributed by the child themselves (often
referred to as “Sexting”). A person convicted of such an offence may face up to 10 years in prison.
The offence of grooming is committed if you are over 18 and have
communicated with a child under 16 at least twice (including by phone or using the Internet) it is an offence to meet them or travel to meet them anywhere in the world with the intention of
committing a sexual offence.
Causing a child under 16 to watch a sexual act is illegal,
including looking at images such as videos, photos or webcams, for your own gratification.
It is also an offence for a person in a position of trust to engage
in sexual activity with any person under 18, with whom they are in a position of trust. (Typically, teachers, social workers, health professionals, connexions staff etc fall in this category of
Any sexual intercourse with a child under the age of 13 commits the
offence of rape.
N.B. Schools should already have a copy of “Children &
Families: Safer from Sexual Crime” document as part of their child protection packs.
More information about the 2003 Act can be found at
Communications Act 2003 (section
Sending by means of the Internet a message or other matter that is
grossly offensive or of an indecent, obscene or menacing character; or sending a false message by means of or persistently making use of the Internet for the purpose of causing annoyance,
inconvenience or needless anxiety is guilty of an offence liable, on conviction, to imprisonment.
This wording is important because an offence is complete as soon as
the message has been sent: there is no need to prove any intent or purpose.
Data Protection Act
The Act requires anyone who handles personal information to notify
the Information Commissioner’s Office of the type of processing it administers, and must comply with important data protection principles when treating personal data relating to any living
individual. The Act also grants individuals rights of access to their personal data, compensation and prevention of processing.
The Computer Misuse Act 1990 (sections
1 — 3)
Regardless of an individual’s motivation, the Act makes it a
criminal offence to:
· gain access to computer
files or software without permission (for example using someone else’s password to access files);
· gain unauthorised access,
as above, in order to commit a further criminal act (such as fraud); or
· Impair the operation of a
computer or program (for example caused by viruses or denial of service attacks).
UK citizens or residents may be extradited to another country if
they are suspected of committing any of the above offences.
Malicious Communications Act 1988
This legislation makes it a criminal offence to send an electronic
message (email) that conveys indecent, grossly offensive, threatening material or information that is false; or is of an indecent or grossly offensive nature if the purpose was to cause a recipient
to suffer distress or anxiety. This can include Racist, Xenophobic and Homophobic comments, messages etc.
Copyright, Design and Patents Act
Copyright is the right to prevent others from copying or using his
or her “work” without permission.
The material to which copyright may attach (known in the business
as “work”) must be the author’s own creation and the result of some skill and judgement. It comes about when an individual expresses an idea in a tangible form. Works such as text, music, sound, film
and programs all qualify for copyright protection. The author of the work is usually the copyright owner, but if it was created during the course of employment it belongs to the
It is an infringement of copyright to copy all or a substantial
part of anyone’s work without obtaining the author’s permission. Usually a licence associated with the work will allow a user to copy or use it for limited purposes. It is advisable always to read
the terms of a licence before you copy or use someone else’s material.
It is also illegal to adapt or use software without a licence or in
ways prohibited by the terms of the software licence.
Public Order Act 1986 (sections 17 —
This Act makes it a criminal offence to stir up racial hatred by
displaying, publishing or distributing written material which is threatening. Like the Racial and Religious Hatred Act 2006 it also makes the possession of inflammatory material with a view of
releasing it a criminal offence.
Obscene Publications Act 1959 and
Publishing an “obscene” article is a criminal offence. Publishing
includes electronic transmission.
Protection from Harassment Act
A person must not pursue a course of conduct, which amounts to
harassment of another, and which he knows or ought to know amounts to harassment of the other.
A person whose course of conduct causes another to fear, on at
least two occasions, that violence will be used against him is guilty of an offence if he knows or ought to know that his course of conduct will cause the other so to fear on each of those
This also includes incidents of Racism, Xenophobia and
Regulation of Investigatory Powers Act
The Regulation of Investigatory Powers Act 2000 (RIP) regulates the
interception of communications and makes it an offence to intercept or monitor communications without the consent of the parties involved in the communication. The RIP was enacted to comply with the
Human Rights Act 1998.
The Telecommunications (Lawful Business Practice) (Interception of
Communications) Regulations 2000, however, permit a degree of monitoring and record keeping, for example, to ensure communications are relevant to school activity or to investigate or detect
unauthorised use of the network. Nevertheless, any monitoring is subject to informed consent, which means steps must have been taken to ensure that everyone who may use the system is informed that
communications may be monitored.
Covert monitoring without informing users that surveillance is
taking place risks breaching data protection and privacy legislation.
Criminal Justice and Immigration Act
Section 63 offence to possess “extreme pornographic
63 (6) must be “grossly offensive, disgusting or otherwise
63 (7) this includes images of “threats to a person life or injury
to anus, breasts or genitals, sexual acts with a corpse or animal whether alive or dead” must also be “explicit and realistic”
Penalties can be up to 3 years
Education and Inspections Act
Education and Inspections Act 2006 outlines legal powers for
schools which relate to Cyberbullying/Bullying:
- Headteachers have the power “to such an extent as is reasonable”
to regulate the conduct of pupils off site.
- School staff are able to confiscate items such as mobile phones
etc when they are being used to cause a disturbance in class or otherwise contravene the school behaviour/anti-bullying policy.