St Teresas E Safety Policy

 

Embed or link this publication

Description

St Teresas E Safety Policy

Popular Pages


p. 1

St Teresa’s RC Primary School E-Safety Policy Re-Drafted December 2013 (To be edited in conjunction with staff, governors, parents and children) St Teresa’s RC Primary School Our Aims and Values Our school aims to provide a happy and safe environment for all those who work in it, as exemplified by our Mission Statement: Introduction ICT in the 21st Century is an essential resource to support learning and teaching, as well as playing an important role in the everyday lives of children, young people and adults. Consequently, we need to build in the use of these technologies in order to arm our young people with the skills to access lifelong learning and employment. Information and Communications Technology covers a wide range of resources including; web-based and mobile learning. It is also important to recognise the constant and fast paced evolution of ICT within our society as a whole. Currently the internet technologies children and young people are using both inside and outside of the classroom include:      Websites Learning Platforms and Virtual Learning Environments Email and Instant Messaging Chat Rooms and Social Networking Blogs

[close]

p. 2

      Podcasting Video Broadcasting Music Downloading Gaming Mobile/ Smart phones with text, video and/ or web functionality Other mobile devices with web functionality Whilst technology can provide young people with great opportunities for learning and fun, some online tools and resources are not always adequately monitored. It is our view that children should be provided with the knowledge and the skills that they need to remain safe and legal when using web technology both in and out of the classroom. ‘Schools are finding that a blocking and banning approach, which merely limits exposure to risk, may no longer b e a sustainable approach… Schools need to focus on a model of empowerment; equipping children with the skills and knowledge they need to use technology safely and responsibly, and managing the risks’ Becta Safeguarding Children Online Feb 2009 Whole School Approach to the safe use of ICT Creating a safe ICT learning environment includes three main elements at St. Teresa’s:  An effective range of technological tools  Policies and procedures, with clear roles and responsibilities  A comprehensive e-safety education programme for pupils, staff and parents Roles and Responsibilities E-Safety is recognised as an essential aspect of strategic leadership in this school and the Head teacher, with the support of the Governors, aims to embed safe practices into the culture of the school. The head teacher ensures that the policy is implemented and has ultimate responsibility to ensure that the policy and practices are embedded and monitored. The named Online Safety Officer in our school from September 2013 is Patrick Duffy. All members of the school community have been made aware of who holds this post. It is the role of the e-safety coordinator to keep abreast of current issues and guidance through organisations such Darlington LA, CEOP (Child Exploitation and Online Protection), Child Net, Northern Grid and the DfE. The Online Safety Officer ensures the Head teacher; Senior Management and Governors are updated as necessary. All teachers are responsible for promoting and supporting safe behaviours in their classrooms and follow school e-safety procedures. All staff should be familiar with the school’s policy including:  safe use of e-mail  safe use of the Internet  safe use of the school network, equipment and data  safe use of digital images and digital technologies, such as mobile phones and digital cameras  publication of pupil information/photographs on the school website  procedures in the event of misuse of technology by any member of the school community (see appendices)  their role in providing e-safety education for pupils. Staff are reminded/updated about e-safety regularly and new staff receive information on the school’s acceptable use policy as part of their induction. Supply Teachers must sign an acceptable use of ICT agreement before using technology equipment in school (see Appendix 2 for staff acceptable use agreement). Managing the school e-safety messages  We endeavour to embed e-safety messages across the curriculum whenever the internet and/or related technologies are used.  The e-safety policy will be shared with new staff, including the acceptable use policy as part of their induction.  E-safety posters will be prominently displayed.

[close]

p. 3

E-safety in the curriculum ICT and online resources are increasingly used across the curriculum. We believe it is essential for safety guidance to be given to the pupils on a regular and meaningful basis. We continually look for new opportunities to promote e-safety.  We provide opportunities within a range of curriculum areas to teach about e-safety.  Educating pupils on the dangers of technologies that maybe encountered outside school is done informally when opportunities arise and as part of the curriculum.  Pupils are taught about copyright and respecting other people’s information, images, etc through discussion, modelling, and activities as part of the ICT curriculum.  Pupils are aware of the impact of bullying and online bullying through work in school and know how to seek help if they are affected by these issues. Pupils are also aware of where to seek advice or help if they experience problems when using the internet and related technologies (see section on Cyberbullying )  Pupils are taught to critically evaluate materials and learn good searching skills through cross curricular teacher models, discussions and via the ICT curriculum. Managing Internet Access The internet is an open communication medium, available to all, at all times. Anyone can view information, send messages, discuss ideas and publish material which makes it both an invaluable resource for education, business and social interaction, as well as a potential risk to young and vulnerable people.  Students will have supervised access to Internet resources through the school’s fixed internet technology.  Staff will preview any recommended sites before use.  Raw image searches are discouraged when working with pupils.  If Internet research is set for homework, specific sites will be suggested that have previously been checked by the teacher. It is advised that parents recheck these sites and supervise this work. Parents will be advised to supervise any further research.  Staff and pupils are aware that school based internet activity can be monitored and explored further if required.  If staff or pupils discover an unsuitable site, the screen must be switched off/ closed and the incident reported immediately to the Online Safety Officer  It is the responsibility of the school, by delegation to the network manager, to ensure that antivirus protection is installed and kept up-to-date on all school machines. E-mail The use of email within school is an essential means of communication for both staff and pupils. In the context of school, email should not be considered private. Educationally, email can offer significant benefits including; direct written contact between schools on different projects, be they staff based or pupil based, within school or externally. We recognise that pupils need to understand how to style an email in relation to their age. In order to achieve ICT level 4 or above, pupils must have experienced sending and receiving emails.  Pupils are introduced to email as part of the ICT Scheme of Work.  The school gives staff their own email account. This is to minimise the risk of receiving unsolicited or malicious emails and avoids the risk of personal profile information being revealed.  Under no circumstances should staff contact pupils or parents using personal email addresses.  Pupils may only use school approved accounts on the school system.  The forwarding of chain letters is not permitted in school.  Pupils must immediately tell a teacher/ trusted adult if they receive an offensive e-mail.  All pupils must use appropriate language in e-mails and must not reveal personal details of themselves or others in e-mail communication, or arrange to meet anyone.  Staff must inform the Online Safety Officer if they receive an offensive e-mail. Publishing pupil’s images and work On a child’s entry to the school, all parents/guardians will be asked to give permission for their child’s photo to be taken (form in Appendix 1) and to use their child's work/photos in the following ways:  on the school web site  in the school prospectus and other printed publications that the school may produce for promotional purposes  in display material that may be used in the school’s communal areas  in display material that may be used in external areas, i.e. exhibition promoting the school  general media appearances, e.g. local/ national media/ press releases sent to the press Pupils’ names will not be published alongside their image and vice versa without permission from the parents. E-mail and postal addresses of pupils will not be published. Pupils’ full names will not be published. Before posting pupils’ work on the Internet, a check needs to be made to ensure that permission has been given for work to be displayed. Social networking and personal publishing

[close]

p. 4

We block/filter access for pupils to social networking sites. Pupils and parents will be advised that the use of social network spaces outside school is inappropriate for primary aged pupils. Pupils will be advised never to give out personal details of any kind which may identify them or their location. Password Security Password security is essential for staff, particularly as they are able to access and use pupil data. Staff are expected to have secure passwords which are not shared with anyone. The pupils are expected to keep their passwords secret and not to share with others, particularly their friends. Staff and pupils are regularly reminded of the need for password security.  All users read and sign an Acceptable Use Agreement to demonstrate that they have understood the school’s esafety rules.  Pupils are not allowed to deliberately access on-line materials or files on the school network, of their peers, teachers or others.  If a password may have been compromised or someone else has become aware of the password the child or adult must report this to the online safety officer.  Staff are aware of their individual responsibilities to protect the security and confidentiality of school networks. Individual staff users must also make sure that workstations are not left unattended and are locked. Data protection Personal data will be recorded, processed, transferred and made available according to the Data Protection Act 1998. Data can only be accessed and used on school computers or laptops. Staff are aware they must not use their personal devices for accessing any school/ children/ pupil data. Data Protection Act 1998 The Act requires anyone who handles personal information to comply with important data protection principles when treating personal data relating to any living individual. The Act grants individuals rights of access to their personal data, compensation and prevention of processing. http://www.hmso.gov.uk/acts/acts1998/19980029.htm Responding to e-safety incidents/complaints As a school we will take all reasonable precautions to ensure e-safety. However, owing to the international scale and linked nature of Internet content, the availability of mobile technologies and speed of change, it is not possible to guarantee that unsuitable material will never appear on a school computer or mobile device. Neither the school nor Darlington LA can accept liability for material accessed, or any consequences of Internet access.  Concerns relating to e-safety should be made to the e-safety co-ordinator. Any complaint about staff misuse must be referred to the Head teacher. Incidents should be logged and the Flowcharts for Managing an e-safety Incident should be followed (see Appendix 4).  All users are aware of the procedures for reporting accidental access to inappropriate materials.  The breach must be immediately reported to the Online Safety Officer.  Deliberate access to inappropriate materials by any user will lead to the incident being logged by the e-safety coordinator, depending on the seriousness of the offence; investigation by the Head teacher/Darlington LA, immediate suspension, possibly leading to dismissal and involvement of police for very serious offences (see flowchart in appendix 4 & 5)  Pupils and parents will be informed of the complaints procedure.  Parents and pupils will need to work in partnership with staff to resolve issues. Cyberbullying Cyberbullying is the use of ICT, particularly mobile phones and the internet, deliberately to upset someone else. The whole school community has a duty to protect all its members and provide a safe, healthy environment. The Educations and Inspections Act 2006 states that Head teachers have the power ‘to such an extent as is reasonable’ to regulate the conduct of pupils when they are off site’. Although bullying is not a specific criminal offence in the UK law, there are laws that can apply in terms of harassing or threatening behaviour, for example, or indeed menacing and threatening communications. There are many types of cyber-bullying. Here are some of the more common: 1. Text messages —that are threatening or cause discomfort - also included here is "bluejacking" (the sending of anonymous text messages over short distances using "Bluetooth" wireless technology) 2. Picture/video-clips via mobile phone cameras - images sent to others to make the victim feel threatened or embarrassed. 3. Mobile phone calls — silent calls or abusive messages; or stealing the victim’s phone and using it to harass others, to make them believe the victim is responsible. 4. Emails — threatening or bullying emails, often sent using a pseudonym or somebody else’s name. 5. Chatroom bullying — menacing or upsetting responses to children or young people when they are in web-based chatroom.

[close]

p. 5

6. Instant messaging (IM) — unpleasant messages sent while children conduct real-time conversations online using MSM (Microsoft Messenger) or Yahoo Chat 7. Bullying via websites — use of defamatory blogs (web logs), personal websites and online personal “own web space” sites such as Bebo and MySpace. The best way to deal with Cyberbullying is to prevent it happening in the first place and to have clear steps to take when responding to it. Preventing Cyberbullying It is important that we work in partnership with pupils and parents to educate them about Cyberbullying as part of our esafety curriculum. They should:  understand how to use these technologies safely and know about the risks and consequences of misusing them  know what to do if they or someone they know are being cyber bullied.  report any problems with Cyberbullying. If they do have a problem, they can talk to the school, parents, the police, the mobile network (for phone) or the Internet Service Provider (ISP). Additional online advice on how to react to Cyberbullying can be found on www.kidscape.org and www.wiredsafety.org See appendix 8 & 9 for Key Safety Advice for children, parents and carers Supporting the person being bullied  Give reassurance that the person has done the right thing by telling someone and inform parents.  Make sure the person knows not to retaliate or return the message.  Help the person keep relevant evidence for any investigation (taking screen capture shots, not deleting messages.)  Check the person knows how to prevent it from happening again e.g. blocking contacts,  changing contact details. Take action to contain the incident when content has been circulated:  remove content  contact the host (social networking site) to get the content taken down  use disciplinary powers to confiscate phones that are being used to cyber bully – ask the pupil who they have sent messages to in case of illegal content (see appendix 5 managing an e-safety incident involving illegal activity.) Investigating Incidents All bullying incidents should be recorded and investigated in the St Teresa’s Primary School e-safety incident log (see Appendix 6). We will:  advise pupils and staff to try and keep a record of the bullying as evidence  take steps to identify the bully, including looking at the schools systems, identifying and interviewing possible witnesses, and contacting the service provider and police if necessary. The police will need to be involved to enable the service provider to look into the data of another user. Working with the bully and sanctions Once the bully is identified, steps should be taken to change their attitude and behaviour by educating them about the effects of Cyberbullying on others. Technology specific sanctions for pupil engaged in Cyberbullying behaviour could include limiting or refusing internet access for a period of time or removing the right to bring a mobile into school. Factors to consider when determining the appropriate sanctions include:  the impact on the victim: was the bully acting anonymously, was the material widely circulated and humiliating, how difficult was controlling the spread of material?  the motivation of the bully: was the incident unintentional or retaliation to bullying behaviour from others? Communications Policy Introducing the e-safety policy to pupils  E-safety rules will be posted in all networked rooms and discussed with pupils at the start of each year (see appendices for e-safety posters for KS1 and KS2.)  Pupils will be informed that network and Internet use will be monitored.  E-safety will be included more prominently in both the PSHE and ICT curricula. Introducing staff to the e-safety policy  All staff will be given the e-safety policy and its application and importance will be explained.  Staff should be aware that Internet traffic can be monitored and traced to the individual user.

[close]

p. 6

  Discretion and professional conduct is essential. Staff training in safe and responsible Internet use and on our e-safety policy will be provided as required or requested. Enlisting parents’ support At St Teresa’s, we believe that it is essential for parents/ carers to be fully involved with promoting e-safety both in and outside of school. We endeavour to consult and discuss e-safety with parents/ carers and seek to promote a wide understanding of the benefits related to ICT and associated risks. The school disseminates information to parents relating to e-safety where appropriate in the form of:  Information and celebration evenings  Posters  Website/  Newsletter items  Parents/carers are asked to read through and sign acceptable use of ICT agreements on behalf of their child on admission to school (see appendix).  Parents/ carers are required to make a decision as to whether they consent to images of their child being taken/ used in the public domain (e.g., on school website)  A partnership approach with parents will be encouraged. This includes parents’ evenings with suggestions for safe home Internet use.  Advice on filtering systems and educational activities that include safe use of the Internet will be made available to parents. Equal Opportunities - Pupils with additional needs Staff are aware that some pupils may require additional teaching including reminders, prompts and further explanation to reinforce their existing knowledge and understanding of e-safety issues. Where a pupil has poor social understanding, careful consideration is given to group interactions when raising awareness of e-safety. Internet activities are planned and well managed for these children. Reviewing this Policy This policy will be reviewed on a yearly basis. It will encompass new technologies and developments. The policy will be amended if new technologies are adopted or Central Government change the orders or guidance in any way. Staff, governors, parents and children (via our School Council) will be consulted on any changes. Appendix 1 St Teresa’s RC Primary School Primary Pupil Acceptable Use of ICT

[close]

p. 7

Agreement/eSafety Rules              I will only use ICT in school for school purposes. I will only use my class e-mail address or my own school e-mail address when e-mailing. I will only open e-mail attachments from people I know, or who my teacher has approved. I will not tell other people my ICT passwords. I will only open/delete my own files. I will not bring software, CDs or ICT equipment into school without permission. I will only use the Internet after being given permission from a teacher. I will make sure that all ICT contact with other children and adults is responsible, polite and sensible. I will not deliberately look for, save or send anything that could be upsetting or not allowed at school. If I accidentally find anything like this, I will minimise the screen and tell a teacher immediately. I will not give out my own details such as my name, phone number or home address. I will not use technology in school time to arrange to meet someone unless this is part of a school project approved by a teacher and a responsible adult comes with me. I will be responsible for my behaviour when using ICT because I know that these rules are to keep me safe. I know that the school may check my use of ICT and monitor the Internet sites I have visited, and that my parent/carer will be contacted if a member of school staff is concerned about my eSafety. Dear Parents/Carers, ICT, including the internet, e-mail and mobile technologies, has become an important part of learning in schools. We expect all children to be safe and responsible when using any ICT. Please read and discuss with your child the eSafety rules overleaf and return this sheet signed by both you and your child. If you have any concerns or would like some explanation please contact your child’s class teacher. This Acceptable Use of ICT Agreement is a summary of our eSafety Policy which is available in full, on request at the office or can be viewed on our school website. Yours sincerely, Mr Duffy Class Teacher and Online Safety Officer Pupil: I have read, understood and agreed with the Rules for Acceptable use of ICT (overleaf) Signed ……………………………………………. (child) Parent's/Carer’s Consent for Internet Access I have read and understood the school rules for Acceptable Use of ICT and give permission for my son / daughter to access the Internet in school. I understand that the school will take all reasonable precautions to ensure pupils cannot access inappropriate materials. I understand that the school cannot be held responsible for the nature or content of materials accessed through the Internet. I agree that should my son/daughter need to access ‘Its Learning’ at home or anywhere else, that I will take all reasonable precautions to ensure he/she cannot access inappropriate materials and that he/she will use the computer in an appropriate manner. Signed………………………...……………… (parent/carer) Date…………………………. Appendix 2 St Teresa’s RC Primary School Acceptable Use of ICT Agreement Staff, Governor and Visitor

[close]

p. 8

Acceptable Use Agreement / Code of Conduct ICT and the related technologies such as email, the internet and mobile devices are an expected part of our daily working life in school. This policy is designed to ensure that all staff are aware of their professional responsibilities when using any form of ICT. All staff are expected to sign this policy and adhere at all times to its contents. Any concerns or clarification should be discussed with Mr Duffy – Online Safety Officer.  I will only use the school’s email / Internet / Shared Area and any related technologies for professional purposes or for uses deemed ‘reasonable’ by the Head or Governing Body.  I will comply with the ICT system security and not disclose any passwords provided to me by the school or other related authorities.  I will ensure that all electronic communications with pupils and staff are compatible with my professional role.  I will not give out my own personal details, such as mobile phone number and personal email address, to pupils.  I will only use the approved, secure email system(s) for any school business.  I will ensure that personal data (such as data held on SIMS) is kept secure and is used appropriately, whether in school, taken off the school premises or accessed remotely.  Personal data can only be taken out of school or accessed remotely when authorised by the Head or Governing Body.  I will not use or install any hardware or software without permission from the e-safety co-ordinators.  I will not browse, download, upload or distribute any material that could be considered offensive, illegal or discriminatory.  Images of pupils and/ or staff will only be taken, stored and used for professional purposes inline with school policy and with written consent of the parent, carer or staff member. Images will not be distributed outside the school network without the permission of the parent/ carer, member of staff or Head teacher. The use of teacher’s personal smartphones may be allowed to digitally record sounds and images within school or on authorised visits provided that the content is safely transferred to a network drive and the recordings are removed within a day from the device that was used to take them.  I understand that all my use of the Internet and other related technologies can be monitored and logged and can be made available, on request by the Head teacher.  I will respect copyright and intellectual property rights.  I will ensure that my online activity, both in school and outside school, will not bring my professional role into disrepute.  I will support and promote the school’s e-Safety policy and help pupils to be safe and responsible in their use of ICT and related technologies.  I will ensure that only children whose parents have given permission for them to use the Internet and ICT are enabled to do so at school. User Signature I agree to follow this code of conduct and to support the safe use of ICT throughout the school Signature …….………………….……………………………………………….… Date ………………….……………… Full Name ……………………………………………………………………........................................... (printed) Job title: …………………………………….………………………………………………………..

[close]

p. 9

Appendix 3 St Teresa’s RC Primary School PARENT CONSENT FORM: Using images and digital video At St Teresa’s RC Primary we take the issue of child safety very seriously, and this includes the use of digital images and video of pupils. Including images and video of pupils in school publications and on the school website can be motivating for the pupils involved, and provide a good opportunity to promote the work of the school. Research has shown that using digital video in education can help encourage creativity, motivate and enthuse pupils, and improve communication and team-working skills. Whereas the risks of using digital images and video in education are minimal, schools have a duty of care towards pupils. This means that pupils will remain unidentifiable, reducing the risk of inappropriate contact, if images or examples of their work (including digital video) are used on the school website or in other school promotional activities. Any use of pupil images and digital video work at St Teresa’s is underpinned by our Acceptable Use Policy. We will never include the full name of the pupil alongside an image. We ask that parents consent to the school taking and using digital images of their children, and for their taking part in the production of digital video, and/or appearing in films. Please complete, sign and return this form to Mr Duffy, ICT Leader I consent to photographs and digital images of the child named below, appearing in printed publications or on the school website. I understand that the images will be used only for educational purposes and that the identity of my child will be protected. I also acknowledge that the images may also be used in and distributed by other media, such as CD-ROM, as part of the promotional activities of the school. I consent to my child taking part in the production of digital videos and appearing in films. I understand that films may be made available on the school website or used in other school promotional activities. Name of child: ............................................................................................... Name of parent or guardian:........................................................................ Address:........................................................................................................ ........................................................................................................................ ........................................................................................................................ Signature: ................................................... Date: ...........................................................

[close]

p. 10

Appendix 4 St Teresa’s RC Primary Flowchart for Managing an e-safety incident not involving any illegal activity Incidents not involving any illegal activity, such as:  using another person’s user name and password  accessing websites which are against school policy  using the technology to upset or bully (in extreme cases this could be illegal.) The online safety officer and/or headteacher should:  record in the e-safety incident log  keep any evidence. If the member of staff has: 1. behaved in a way that has, or may have harmed a child. 2. possibly committed a criminal offence 3. behaved in a way which indicates s/he is unsuitable to work with children. Miss Boyce. would be notified and appropriate action would be taken after:  review evidence and determine whether incident is accidental or Pupil as victim deliberate  decide upon the appropriate course of action follow school disciplinary procedures. Yes Did the incident involve a member of staff? No Was the child the victim or instigator? Pupil as instigator Pupil as a victim In-school action to support pupil by one or Appendix 5 more of RC following: St Teresa’sthePrimary • Class teacher • Head teacher • Designated person for Child Protection. Inform parents/carer as appropriate If the child is at risk contact the relevant outside agency. Review incident and identify if other pupils were involved. • Decide appropriate sanctions based on school rules. • Inform parents/carers if serious or persistent incident. • In serious incident contact the relevant agency as the child as instigator could be at risk. • Review school procedure/policy to develop best practice.

[close]

p. 11

Flowchart for Managing an e-safety incident involving illegal activity Illegal means something against the law, such as: • downloading child pornography • passing onto others images or video containing child pornography • inciting racial or religious hatred • promoting illegal acts Following an incident the e-safety co-ordinator and/or headteacher will need to decide quickly if the incident involves any illegal activity Was illegal material or activity found or suspected? Yes 1. Inform the police and follow any advice given by the police otherwise: 2. Confiscate any laptop or other device and if related to school network disable user account 3. Save ALL evidence but DO NOT view or copy. Let the police review the evidence • If a pupil is involved contact the Child Protection School Liaison Officer. • If a member of staff is involved contact the relevant outside agency If the incident did not involve any illegal activity refer to flowchart relating to non-illegal incidents

[close]

p. 12

Appendix 6 St Teresas RC Primary E-Safety Incident Log Details of ALL e-safety incidents to be recorded in the Incident Log by the online safety officer. This incident log will be monitored termly by the e-safety co-ordinator and Head teacher. Date and time Name of pupil or staff member Male or female Room and computer/ device number Details of incident (including evidence) Actions and reasons

[close]

p. 13

Appendix 7 St Teresa’s RC Primary Advice for Children on Cyber-bullying If you're being bullied by phone or the Internet  Remember, bullying is never your fault. It can be stopped and it can usually be traced.  Don't ignore the bullying. Tell someone you trust, such as a teacher or parent, or call an advice line.  Try to keep calm. If you are frightened, try to show it as little as possible. Don't get angry, it will only make the person bullying you more likely to continue.  Don't give out your personal details online - if you're in a chatroom, watch what you say about where you live, the school you go to, your email address etc. All these things can help someone who wants to harm you build up a picture about you.  Keep and save any bullying emails, text messages or images. Then you can show them to a parent or teacher as evidence.  If you can, make a note of the time and date bullying messages or images were sent, and note any details about the sender. There's plenty of online advice on how to react to cyberbullying. For example, www.kidscape.org and www.wiredsafety.org have some useful tips: Text/video messaging You can easily stop receiving text messages for a while by turning off incoming messages for a couple of days. This might stop the person texting you by making them believe you've changed your phone number. To find out how to do this, visit www.wiredsafety.org.  If the bullying persists, you can change your phone number. Ask your mobile  service provider.  Don't reply to abusive or worrying text or video messages. Your mobile service  provider will have a number for you to ring or text to report phone bullying. Visit  their website for details.  Don't delete messages from cyberbullies. You don't have to read them, but you  should keep them as evidence. Text harassment is a crime. If the calls are simply annoying, tell a teacher, parent or carer. If they are threatening or malicious and they persist, report them to the police, taking with you all the messages you've received. Phone calls If you get an abusive or silent phone call, don't hang up immediately. Instead, put the phone down and walk away for a few minutes. Then hang up or turn your phone off. Once they realise they can't get you rattled, callers usually get bored and stop bothering you.  Always tell someone else: a teacher, youth worker, parent, or carer. Get them to support you and monitor what's going on.  Don't give out personal details such as your phone number to just anyone. And never leave your phone lying around. When you answer your phone, just say 'hello', not your name. If they ask you to confirm your phone number, ask what number they want and then tell them if they've got the right number or not. You can use your voicemail to vet your calls. A lot of mobiles display the caller's number. See if you recognise it. If you don't, let it divert to voicemail instead of answering it.  And don't leave your name on your voicemail greeting. You could get an adult to record your greeting. Their voice might stop the caller ringing again. Almost all calls nowadays can be traced. If the problem continues, think about changing your phone number. If you receive calls that scare or trouble you, make a note of the times and dates and report them to the police. If your mobile can record calls, take the recording too. Emails  Never reply to unpleasant or unwanted emails — the sender wants a response, so don't give them that satisfaction.  Keep the emails as evidence. And tell an adult about them.  Ask an adult to contact the sender's Internet Service Provider (ISP) by writing abuse@ and then the host, e.g. abuse@hotmail.com

[close]

p. 14

  Never reply to someone you don't know, even if there's an option to 'unsubscribe'. Replying simply confirms your email address as a real one. Web bullying If the bullying is on a website (e.g. Moshi Monsters) tell a teacher or parent, just as you would if the bullying was face-toface – even if you don’t actually know the bully’s identity. Serious bullying should be reported to the police - for example threats of a physical or sexual nature. Your parent or teacher will help you do this. Chat rooms and instant messaging  Never give out your name, address, phone number, school name or password online.  It's a good idea to use a nickname. And don't give out photos of yourself.  Don't accept emails or open files from people you don't know.  Remember it might not just be people your own age in a chat room.  Stick to public areas in chat rooms and get out if you feel uncomfortable.  Tell your parents or carers if you feel uncomfortable or worried about anything that happens in a chat room.  Think carefully about what you write; don't leave yourself open to bullying.  Don't ever give out passwords to your mobile or email account. Three steps to stay out of harm’s way  Respect other people - online and off. Don’t spread rumours about people or share their secrets, including their phone numbers and passwords.  If someone insults you online or by phone, stay calm – and ignore them.  Think how you would feel if you were bullied. You’re responsible for your own behaviour – make sure you don’t distress other people or cause them to be bullied by someone else.

[close]

p. 15

Appendix 8 St Teresa’s RC Primary

[close]

Comments

no comments yet