Federation of Beckwithshaw & Kettlesing Felliscliffe Schools and Ripley Endowed CE School

Online Safety Policy

Date of Next Review

Spring 2024

Responsibility

HT/FGB

Introduction

The Federation’s online policy aims to create an environment where pupils, staff, parents, governors and the wider school community work together to inform each other of ways to use the internet responsibly, safely and positively.

Through teaching computing, we equip our children to participate in a rapidly-changing world where work and leisure activities are increasingly transformed by technology. We enable them to find, explore, analyse, exchange and present information in a varied and stimulating way. Computing skills are a major factor in enabling them to be confident, creative and independent learners. As a result, the teaching style that we adopt is as active and practical as possible. We provide suitable learning opportunities for all children by matching the challenge of the task to the ability and experience of the child.

This online policy encourages appropriate and safe conduct and behaviour when learning online. Pupils, staff and all other users of school related technologies will work together to agree standards and expectations relating to usage in order to promote and ensure positive behaviours which can transfer directly into each pupil’s adult life and prepare them for experiences and expectations in the workplace.

The policy is not designed to be a list of prohibited activities, but instead a list of areas to discuss, teach and inform, in order to develop knowledge leading to a safer Internet usage and improve e-safety knowledge.

Policy Scope

This policy and agreements apply to all pupils, staff, support staff, external contractors and members of the wider school community who use, have access to or maintain school and school related internet, computer systems and mobile technologies internally and externally.

The Federation will make reasonable use of relevant legislation and guidelines to affect positive behaviour regarding ICT and Internet usage both on and off the school site. ‘In Loco Parentis’ provision under the Children Act 1989 also allows the school to report and act on instances of cyber bullying, abuse, harassment (including sexual harassment), malicious communication and grossly offensive material; including reporting to the police, social media websites, and hosting providers on behalf of pupils.

The online policy covers the use of:

  • School based ICT systems and equipment.
  • School based intranet and networking.
  • School related external internet, including but not exclusively, e-learning platforms, social media websites.
  • External access to internal school networking, such as webmail, Management Information Systems, network access, file-serving (document folders) and printing.
  • School computing equipment off-site, for example staff laptops, digital cameras, tablets.
  • Pupil and staff personal computing equipment when used in school and which makes use of school networking, file-serving or internet facilities.
  • Tablets, mobile phones, devices and laptops when used on the school site.

Securely Maintaining Information

It is important to review the security of the whole system from user to internet. This is a major responsibility that includes not only the delivery of essential learning services but also the personal safety of staff and learners.

Local Area Network (LAN) security issues include:

  • Users must act reasonably — e.g. the downloading of large files during the working day will affect the service that others receive.
  • Users must take responsibility for their network use. For school staff, flouting electronic use policy is regarded as a reason for dismissal.
  • Workstations should be secured against user mistakes and deliberate actions.
  • Servers must be located securely and physical access restricted.
  • The server operating system must be secured and kept up to date; through regular monthly patching.
  • Virus protection for the whole network must be installed and current.
  • Access by wireless devices must be proactively managed and secured with a password.
  • Guest WiFi will be password protected.

Wide Area Network (WAN) security issues include:

  • The schools’ firewalls are configured to prevent unauthorised access.
  • Decisions on WAN security are made on a partnership between partner organisations (JP Consultancy).
  • The schools’ broadband network is protected by a high performance firewall (Sophos).
  • The security of the school information systems and users are monitored regularly.
  • Virus protection will be updated regularly.
  • Personal data sent over the internet or taken off site will be encrypted.
  • Portable media may not be used unless it has been encrypted and virus checked.
  • Unapproved software will not be allowed in work areas or attached to email.
  • Files held on the network will be regularly checked.
  • System capacity in relation to storage will be checked regularly.
  • The use of user logins and passwords to access the network will be enforced.

Filter Management.

  • The school’s broadband access provides filtering appropriate to the age and maturity of learners. There is flexibility in the filtering system to allow for changes in provision depending on the learning required.
  • A description of the filtering service should be shared with the school (Infrastructure). Sophos allows the blocking of URLs or full categories as required.
  • Any breaches in filtering should be reported to the school administrators and, where appropriate, the Designated Safeguarding Officer. The school administrator will log the URL and record the incident and escalate the concern as appropriate.
  • The School filtering system will block all sites on the Internet Watch Foundation (IWF) list.
  • The School Senior Leadership Team will ensure that regular checks are made to ensure that the filtering methods selected are effective.
  • Any material that the school believes is illegal will be reported to appropriate agencies.

Monitoring the Online Policy

The online policy will be actively monitored and evaluated by:

  • Executive Head Teacher.
  • Base Leaders.
  • Designated Safeguarding Officer (DSL)
  • Teaching Staff.
  • External IT Contractors

In the event of an online incident in school, the following people will be informed immediately: Executive Head Teacher, DSL and school administrator.

Online incidents will be reported to the full governing body.

Online Policy Review and Evaluation Schedule.

The online policy and Acceptable Use Agreement are reviewed every three years. New staff, at induction, are prompted to read and sign the Acceptable Use Policy.  Additionally, the policy will be reviewed promptly upon:

  • Serious and/or frequent breaches of the acceptable internet use policy or other in the light of online incidents.
  • New guidance by government, Local Authority, safeguarding authorities.
  • Significant changes in technology as used by the school or pupils in the wider community.
  • Online incidents in the community or local schools which might impact on the school community.
  • Advice from the Police and/or the NYCC Safeguarding Partnership Board.
  • In line with OFSTED recommendations.

School Management of E-Safety

Senior Leadership Team (SLT):

SLT are responsible for determining, evaluating and reviewing e- safety policies to encompass teaching and learning, use of school IT equipment and facilities by pupils, staff and visitors, and the agreed criteria for acceptable use by pupils, school staff and governors of internet capable equipment for school related purposes or in situations which will impact on the reputation of the school, and/or on school premises.

E-safety provision is always designed to encourage positive behaviours and practical real-world strategies for all members of the school and wider school community. The leadership team is encouraged to be aspirational and innovative in developing strategies for e-safety provision.

Governors’ Responsibility:

The governor for safeguarding is responsible for monitoring e-safety and will monitor e-safety incidents and governor e-safety training.

ICT External Contractors:

External ICT support staff and technicians are responsible for maintaining the school’s networking, IT infrastructure and hardware. They are aware of current thinking and trends in IT security and ensure that the school system, particularly file-sharing and access to the Internet is secure.

They further ensure that all reasonable steps have been taken to ensure that systems are not open to abuse or unauthorised external access, with regard to external logins and wireless networking.

Teaching and Teaching Support Staff:

Teaching and teaching support staff need to ensure that they are aware of the current school online policy, practices and associated procedures for reporting online incidents.

Teaching and teaching support staff will be provided with e-safety induction as part of the overall staff induction procedures. All staff need to ensure that they have read, understood and signed (thereby indicating an agreement) the Acceptable Use Agreement relevant to internet and computer use in school.

All staff need to follow the school’s Code of Conduct Policy regarding social media, in regard to external off-site use, personal use (mindful of not bringing the school into disrepute), possible contractual obligations.

All teaching staff need to rigorously monitor pupil internet and computer usage in line with the policy. This also includes the use of personal technology such as cameras, phones and other gadgets on the school site.

Teaching staff should promote best practice regarding avoiding copyright infringement and plagiarism. They should be aware of online propaganda and help pupils with critical evaluation of online materials. Additionally, all internet usage and suggested websites should be pre-vetted prior to use. Be aware of links within materials used; check these are acceptable and are allowed through the Sophos before use.

Whilst online learning at home, staff should remind parents of how to keep children safe online through the sharing of online safety websites such as parentprotect.co.uk, learning.nspcc.or.uk. Again, all website used within lessons should be carefully vetted prior to sharing with children.

Staff Use of Personal Devices

  • Staff are not permitted to use their own personal phones or devices for contacting children, and their families within or outside of the setting in a professional capacity. 
  • Staff should use the school phone where contact with learners or parents/carers is required.
  • Mobile Phone and devices will be switched to ‘silent’ mode, Bluetooth communication should be “hidden” or switched off and mobile phones or devices will not be used during teaching periods unless permission has been given by a member of Senior Leadership Team in emergency circumstances.
  • If members of staff have an educational reason to allow children to use mobile phones or personal device as part of an educational activity then it will only take place when approved by the Senior Leadership Team.
  • Staff should not use personal devices such as mobile phones or cameras to take photos or videos of learners and will only use work-provided equipment for this purpose.
  • If a member of staff breaches the Federation’s policy then disciplinary action may be take.

Designated Safeguarding Officer:

The Designated Safeguarding Officer is trained in specific online issues. Accredited training with reference to child protection issues has been accessed.  The Designated Safeguarding Officer can differentiate which online incidents are required to be reported to CEOP, local Police, LADO, Local Safeguarding Children’s Board, social services and parents/guardians; and also determine whether the information from such an incident should be restricted to nominated members of the leadership team.

Possible scenarios might include:

  • Allegations against members of staff.
  • Computer crime – for example hacking of school systems.
  • Allegations or evidence of ‘grooming’.
  • Allegations or evidence of cyber bullying in the form of threats of violence, harassment or a malicious communication.
  • Producing and sharing of Youth Produced Sexual Imagery (YPSI).
  • Acting ‘in loco parentis’ and liaising with websites and social media platforms such as Twitter, Instagram, Snapchat and Facebook to remove instances of illegal material or cyber bullying.

Pupils:

Pupils need to be aware of how to report online incidents in school, and how to use external reporting facilities, such as the Click CEOP button or Childline number. Purple Mash and Jigsaw Schemes of learning cover in detail e-safety and these are taught half termly.

Learners Use of Personal Devices:

Mobile phones will be handed in to the class teacher or school office upon arrival. They will then be stored securely until they are returned at home time. Mobile phones will not be taken on outdoor activities. If a learner needs to contact his/her parents/carers they will be allowed to use a school phone or the school administrator will do this for them.

Children should protect their phone numbers by only giving them to trusted friends and family members.

Parents and Guardians:

It is hoped that parents and guardians will support the school’s stance on promoting good internet behaviour and responsible use of IT equipment and mobile technologies both at school and at home.

The school will provide opportunities to educate parents with regard to e-safety through the school website and newsletters.

Other users:

Other users such as school visitors, or wider school community stakeholders or external contractors should be expected to agree to a visitor’s safety document specific to their level of access and usage.

External users with significant access to school systems including sensitive information or information held securely under the Data Protection Act should be DBS checked. This includes external contractors who might maintain the school domain name and web hosting – which would facilitate access to cloud file storage, website documents, and email.

How will the Federation Provide E-Safety Education?

Pupils – curriculum teaching:

From September 2020, Relationship Education became compulsory for all primary aged children.

The DfE guidance: Relationship Education, Relationship Sex Education and Health Education states, ‘The principles of positive relationships also apply online especially as, by the end of primary school, many children will already be using the internet. When teaching relationships content, teachers should address online safety and appropriate behaviour in a way that is relevant to pupils’ lives. Teachers should include content on how information and data is shared and used in all contexts, including online; for example, sharing pictures, understanding that many websites are businesses and how sites may use information provided by users in ways they might not expect.’

Additionally, further guidance Teaching Online Safety in Schools (DfE June 2019) states the importance: ‘to focus on the underpinning knowledge and behaviours that can help pupils to navigate the online world safely and confidently regardless of the device, platform or app. This teaching could be built into existing lessons across the curriculum, covered within specific online safety lessons and/or school wide approaches. Teaching must always be age and developmentally appropriate.’

The 4 key categories of risk 4Cs

Our approach to online safety is based on addressing the following categories of risk:

  • Content – being exposed to illegal, inappropriate or harmful content, such as pornography, fake news, racism, misogyny, self-harm, suicide, anti-Semitism, radicalisation and extremism
  • Contact – being subjected to harmful online interaction with other users, such as peer-to-peer pressure, commercial advertising and adults posing as children or young adults with the intention to groom or exploit them for sexual, criminal, financial or other purposes
  • Conduct – personal online behaviour that increases the likelihood of, or causes, harm, such as making, sending and receiving explicit images (e.g. consensual and non-consensual sharing of nudes and semi-nudes and/or pornography), sharing other explicit images and online bullying; and
  • Commerce – risks such as online gambling, inappropriate advertising, phishing and/or financial scamOur approach to online safety is based on addressing the following categories of risk:

Through the curriculum children will learn to:

Evaluate what they see online: This will enable pupils to make judgements about what they see online and not automatically assume that what they see is true, valid or acceptable.

This will include:

  • Is this website/URL/email fake? How can I tell?
  • What does this cookie do and what information am I sharing?
  • Is this person who they say they are?
  • Why does someone want me to see this?
  • Why does someone want me to send this?
  • Why would someone want me to believe this?
  • Why does this person want my personal information?
  • What’s behind this post?
  • Is this too good to be true?
  • Is this fact or opinion?

How to recognise Cyber-Bullying:

Cyberbullying is any form of bullying which takes place online or through smartphones and tablets. Children will learn:

  • Social networking sites, messaging apps, gaming sites and chat rooms such as Facebook, XBox Live, Instagram, YouTube, Snapchat and other chat rooms can be great fun and a positive experience.
  • Anyone who makes threats to you on the internet could be committing a criminal offence.
  • It's against the law in the UK to use the phone system, which includes the internet, to cause alarm or distress
  • How to keep safe by using unusual passwords. Use a combination of letters, lowercase, uppercase, symbols and numbers
  • Bullying can be reported to an organisation called Report Harmful Content online and they can help to get things taken down.

See Annex A for types of Cyber –Bullying.

How to techniques used for persuasion:

This will enable pupils to recognise the techniques that are often used to persuade or manipulate others. Understanding that a strong grasp of knowledge across many areas makes people less vulnerable to these techniques and better equipped to recognise and respond appropriately to strongly biased intent or malicious activity.

  • Online content which tries to make people believe something false is true and/or mislead (misinformation and disinformation).
  • Techniques that companies use to persuade people to buy something.
  • Ways in which games and social media companies try to keep users online longer (persuasive/sticky design).
  • Criminal activities such as grooming.

This will enable pupils to understand what acceptable and unacceptable online behaviour look like. Pupils will be taught that the same standard of behaviour and honesty apply on and offline, including the importance of respect for others.

  • Looking at why people behave differently online, for example how anonymity (you do not know me) and invisibility (you cannot see me) affect what people do.
  • Looking at how online emotions can be intensified resulting in mob mentality.
  • Teaching techniques (relevant on and offline) to defuse or calm arguments, for example a disagreement with friends, and disengage from unwanted contact or content online.
  • Considering unacceptable online behaviours often passed off as so-called social norms or just banter. For example, negative language that can be used, and in some cases is often expected, as part of online gaming and the acceptance of misogynistic, homophobic and racist language that would never be tolerated offline.
  • How to identify online risks: This will enable pupils to identify possible online risks and make informed decisions about how to act. This should not be about providing a list of what not to do online. The focus should be to help pupils assess a situation, think through the consequences of acting in different ways and decide on the best course of action.

Schools can help pupils to identify and manage risk by:

  • Discussing the ways in which someone may put themselves at risk online.
  • Discussing risks posed by another person’s online behaviour.
  • Discussing when risk taking can be positive and negative.
  • Discussing “online reputation” and the positive and negative aspects of an online digital footprint. This could include longer-term considerations, i.e how past online behaviours could impact on their future, when applying for a place at university or a job for example.
  • Discussing the risks vs the benefits of sharing information online and how to make a judgement about when and how to share and who to share with.
  • Asking questions such as what might happen if I post something online? Who will see it? Who might they send it to?

How and when to seek support:

This will enable pupils to understand safe ways in which to seek support if they are concerned or upset by something they have seen online. Pupils will understand how to:

  • Identify who trusted adults are.
  • Look at different ways to access support from the school, police, the National Crime Agency’s Click CEOP reporting service for children and 3rd sector organisations such as Childline and Internet Watch Foundation. This should link to wider school policies and processes around reporting of safeguarding and child protection incidents and concerns to school staff (see Keeping Children Safe in Education).
  • Help them to understand that various platforms and apps will have ways in which inappropriate contact or content can be reported.

Throughout the curriculum teaching about potential harms will include:

  • Age restrictions
  • Content: How it can be used and shared
  • Password protection
  • Personal data and privacy settings
  • Persuasive design which keeps 'users online for longer than they might have planned or desired'
  • Targeting of online content
  • Abuse (online)
  • Content which incites...hate, violence
  • Fake profiles
  • Grooming
  • Live streaming
  • Unsafe communications
  • Impact on confidence (including body confidence)
  • Impact on quality of life, physical and mental health and relationships

Online safety events – such as Safer Internet Day and Anti Bullying Week are delivered. The Federation has a subscription to the National Online Safety Programme.

Parents/Carers – information and events:

Online safety information is directly available to parents via the school website - which is update with the latest online safety news and issues- and newsletters. The Federation subscribes to a dedicated National Online Safety support platform. School will take advantage of occasions when there are large numbers of parents in school to promote online safety such as the community police officer chatting to parents about safety at parental consultation events.

Policy guidance for handling personal data, dealing with freedom of information requests, and complying with privacy regulations pertaining to website data

All of these areas are regulated by the Information Commissioner (ICO), and every UK organisation has to comply with the responsibilities and obligations as defined by the ICO. Schools are no different to any other organisation in this regard. The ICO guidance on how to comply with these obligations is updated regularly. The Federation refers directly to this guidance in these areas.

When disposing of computer equipment, schools needs to ensure all data, including personal data is wiped, not deleted from storage.

Use of IT facilities for curriculum teaching and learning

Use of the Internet and IT facilities should be clearly planned prior to the activity. Websites and software Apps should be suggested and children should be trusted to be responsible when researching the internet, and teaching staff will consider the age and maturity of the students.

General Data Protection and Online Safety

The GDPR sets out the key principles that all personal data must be processed in line with.

  • Data must be: processed lawfully, fairly and transparently; collected for specific, explicit and legitimate purposes; limited to what is necessary for the purposes for which it is processed; accurate and kept up to date; held securely; only retained for as long as is necessary for the reasons it was collected

There are also stronger rights for individuals regarding their own data.

  • The individual’s rights include: to be informed about how their data is used, to have access to their data, to rectify incorrect information, to have their data erased, to restrict how their data is used, to move their data from one organisation to another, and to object to their data being used at all.

The General Data Protection Act is relevant to online safety since it impacts on the way in which personal information should be secured on school networks, computers and storage devices; and the security required for accessing, in order to prevent unauthorised access and dissemination of personal material.

  • Staff need to ensure that care is taken to ensure the safety and security of personal data regarding all of the school population and external stakeholders, particularly, but not exclusively: pupils, parents, staff and external agencies. Personal and sensitive information should only be sent by e mail when on a secure network.
  • Personal data should only be stored on secure devices. In other words, only computers, servers, file- servers, cloud space, or devices which require a user name and password to access the information.
  • Secure accounts need to be logged off after use to prevent unauthorised access.
  • Personal e mails should not be used for school business.

Personal information on the School Website

  • No material defined as ‘personal information’ under the General Data Protection Act will be used on the school website.
  • The Federation considers staff privacy issues carefully with regard to publishing staff email addresses, staff lists, photos of staff, staff qualifications and any other personally identifying information.

Communications and Acceptable Use

The Federation makes full use of ever developing communication technologies and appreciates that these technologies can enhance learning.

Useful links to external organisations

CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk

Childline: www.childline.org.uk

Childnet: www.childnet.com

Cybermentors: www.cybermentors.org.uk

Digizen: www.digizen.org.uk

Internet Watch Foundation (IWF): www.iwf.org.uk

Police: In an emergency (a life is in danger or a crime in progress) dial 999. For other non-urgent enquiries contact local Police

NYCC Safeguarding Partnership Board: NYSCP (safeguardingchildren.co.uk)

Kidsmart: www.kidsmart.org.uk

Teach Today: Home | Teachtoday

Think U Know website: www.thinkuknow.co.uk

Virtual Global Taskforce — Report Abuse: www.virtualglobaltaskforce.com

Vulnerable Children in a Digital World - Internet Matters

Children’s online activities, risks and safety - A literature review by the UKCCI

Appendix 1: EYFS and KS1 acceptable use agreement (pupils and parents/carers)

Acceptable use of the school’s ICT systems and internet: agreement for pupils and parents/carers

Name of pupil:

When I use the school’s ICT systems (like computers) and get onto the internet in school I will:

  • Ask a teacher or adult if I can do so before using them
  • Only use websites that a teacher or adult has told me or allowed me to use
  • Tell my teacher immediately if:
    • I click on a website by mistake
    • I receive messages from people I don’t know
    • I find anything that may upset or harm me or my friends
  • Use school computers for school work only
  • Be kind to others and not upset or be rude to them
  • Look after the school ICT equipment and tell a teacher straight away if something is broken or not working properly
  • Only use the username and password I have been given
  • Try my hardest to remember my username and password
  • Never share my password with anyone, including my friends.
  • Never give my personal information (my name, address or telephone numbers) to anyone without the permission of my teacher or parent/carer
  • Save my work on the school network
  • Check with my teacher before I print anything
  • Log off or shut down a computer when I have finished using it

I agree that the school will monitor the websites I visit and that there will be consequences if I don’t follow the rules.

Signed (pupil):

Date:

Parent/carer agreement: I agree that my child can use the school’s ICT systems and internet when appropriately supervised by a member of school staff. I agree to the conditions set out above for pupils using the school’s ICT systems and internet, and will make sure my child understands these.

Signed (parent/carer):         

Date:

Appendix 2: KS2, KS3 and KS4 acceptable use agreement (pupils and parents/carers)

Acceptable use of the school’s ICT systems and internet: agreement for pupils and parents/carers

Name of pupil:

I will read and follow the rules in the acceptable use agreement policy

When I use the school’s ICT systems (like computers) and get onto the internet in school I will:

  • Always use the school’s ICT systems and the internet responsibly and for educational purposes only
  • Only use them when a teacher is present, or with a teacher’s permission
  • Keep my username and passwords safe and not share these with others
  • Keep my private information safe at all times and not give my name, address or telephone number to anyone without the permission of my teacher or parent/carer
  • Tell a teacher (or sensible adult) immediately if I find any material which might upset, distress or harm me or others
  • Always log off or shut down a computer when I’m finished working on it

I will not:

  • Access any inappropriate websites including: social networking sites, chat rooms and gaming sites unless my teacher has expressly allowed this as part of a learning activity
  • Open any attachments in emails, or follow any links in emails, without first checking with a teacher
  • Use any inappropriate language when communicating online, including in emails
  • Log in to the school’s network using someone else’s details
  • Arrange to meet anyone offline without first consulting my parent/carer, or without adult supervision

If I bring a personal mobile phone or other personal electronic device into school:

  • I will hand them immediately to a teacher who will look after them until home time.

I agree that the school will monitor the websites I visit and that there will be consequences if I don’t follow the rules.

Signed (pupil):

Date:

Parent/carer’s agreement: I agree that my child can use the school’s ICT systems and internet when appropriately supervised by a member of school staff. I agree to the conditions set out above for pupils using the school’s ICT systems and internet, and for using personal electronic devices in school, and will make sure my child understands these.

Signed (parent/carer):

Date:

Appendix 3: acceptable use agreement (staff, governors, volunteers and visitors)

Acceptable use of the school’s ICT systems and internet: agreement for staff, governors,volunteers and visitors

Name of staff member/governor/volunteer/visitor:

When using the school’s ICT systems and accessing the internet in school, or outside school on a work device (if applicable), I will not:

  • Access, or attempt to access inappropriate material, including but not limited to material of a violent, criminal or pornographic nature (or create, share, link to or send such material)
  • Use them in any way which could harm the school’s reputation
  • Access social networking sites or chat rooms
  • Use any improper language when communicating online, including in emails or other messaging services
  • Install any unauthorised software, or connect unauthorised hardware or devices to the school’s network
  • Share my password with others or log in to the school’s network using someone else’s details
  • Take photographs of pupils without checking with teachers first
  • Share confidential information about the school, its pupils or staff, or other members of the community
  • Access, modify or share data I’m not authorised to access, modify or share
  • Promote private businesses, unless that business is directly related to the school

I will only use the school’s ICT systems and access the internet in school, or outside school on a work device, for educational purposes or for the purpose of fulfilling the duties of my role.

I am aware that emails can be part of Freedom of Information requests so all my correspondence will be professional, courtesy and respectful

I agree that the school will monitor the websites I visit and my use of the school’s ICT facilities and systems.

I will take all reasonable steps to ensure that work devices are secure and password-protected when using them outside school, and keep all data securely stored in accordance with this policy and the school’s data protection policy.

I will let the designated safeguarding lead (DSL) and ICT manager know if a pupil informs me they have found any material which might upset, distress or harm them or others, and will also do so if I encounter any such material.

I will always use the school’s ICT systems and internet responsibly, and ensure that pupils in my care do so too.

Signed (staff member/governor/volunteer/visitor):

Date:

Annex A

Types of cyberbullying

There are many ways of bullying someone online and for some it can take shape in more ways than one. Some of the types of cyber bullying are:

Harassment - This is the act of sending offensive, rude, and insulting messages and being abusive. Nasty or humiliating comments on posts, photos and videos on social media sites, chat rooms and gaming sites.

Denigration – This is when someone may send information about another person that is fake, damaging and untrue. Sharing photos of someone for the purpose to ridicule, spreading fake rumours and gossip. The photos can also be altered for the purpose of bullying.

Flaming – This is when someone is purposely using extreme and offensive language and getting into online arguments and fights. They do this to cause reactions and enjoy the fact it causes someone to get distressed.

Impersonation – This is when someone will hack into someone’s email or social networking account and use the person's online identity to send or post vicious or embarrassing material to/about others. They may also create fake accounts to cause hurt and humiliation.

Outing and Trickery – This is when someone may share personal information about another or trick someone into revealing secrets and forward it to others. They may also do this with private images and videos too.

Cyber Stalking – This is the act of repeatedly sending messages that include threats of harm, harassment, intimidating messages, or engaging in other online activities that make a person afraid for his or her safety. The actions may be illegal too depending on what they are doing.

Exclusion – This is when others intentionally leave someone out of a group such as group messages, online apps, gaming sites and other online engagement.

Taken from Cyber bullying advice | Bullying UK

Further information can be found on this site.