Design note 4 - what do we mean?
In addition to the similarities between our new icon and the real Northern Lights, we particularly liked some of the themes the Northern Lights icon represented, namely:
In addition to the similarities between our new icon and the real Northern Lights, we particularly liked some of the themes the Northern Lights icon represented, namely:
To complement our dynamic new Northern Lights icon, we needed a strong colour pallette and confident, contemporary font.
The contrasting yet complimentary colours in our logo symbolises our value of diversity and unity. We often talk about 'the same but different' at Beckfoot Trust to acknowledge that whilst we have a very clear One Trust identity and clarity on what remarkable means, we also know that one size does not always fit all.
Perhaps the most important part of our new Beckfoot Trust logo is the icon, shown to the right here.
We call it our Northern Lights.
In nature, the Northern Lights are seen as something unique and truly Remarkable that are associated with the North.
Our Northern Lights icon represents The Beckfoot Trust which is also on a constant journey to Remarkable and is strongly associated with the North of England.
As part of our ongoing Journey to Remarkable we felt it was important to give The Beckfoot Trust a strong, confident and contemporary logo and brand that was worthy of an organisation with such high standards and aspirations.
The new Trust logo was a departure from the previous logo style and was definitely designed with the future in mind.

1.1 Beckfoot Trust recognises that Information and Communications Technology (ICT) in a useful resource to support teaching and learning and is an inevitable feature in the everyday lives of children, young people and adults.
1.2 We also recognises that the use of technology has also become a significant component of many safeguarding issues, including Child Sexual Exploitation, radicalisation, child on child abuse and sexual harassment, and understands that technology can be used as a platform to facilitate harm.
1.3 Beckfoot Trust aims to protect and educate students and adults in their use of technology and has in place mechanisms to identify, intervene in, and escalate any incident where appropriate. It recognises the vulnerability of students online, but particularly groups who are more susceptible such as those with SEND and protected characteristics.
1.4 Beckfoot Trust ensures that each school has appropriate filters and monitoring systems in place to safeguard children from potentially harmful and inappropriate online material and does all it reasonably can to limit students’ exposure to the above risks from the School’s IT system. Students’ access to the internet via their personal mobile devices on school premises is limited and regulated. As part of our safeguarding practice staff accounts are also monitored too.
2.1 DFE Guidance
This policy is based on the Department for Education’s (DfE) latest statutory safeguarding guidance, Keeping Children Safe in Education. Also, the following DfE advice for schools:
It reflects existing legislation, including but not limited to the Education Act 1996 (as amended), the Education and Inspections Act 2006 and the Equality Act 2010. In addition, it reflects the Education Act 2011, which has given teachers stronger powers to tackle cyber-bullying by, if necessary, searching for and deleting inappropriate images or files on students’ electronic devices where they believe there is a ‘good reason’ to do so.
The policy also considers the National Curriculum: computing programmes of study and the Online Safety Act 2023
2.2 Links with other Trust policies:
3.1 ICT covers a wide range of resources including web-based and mobile learning. It is also important to recognise the constant and fast paced evolution of ICT within our society. Currently the internet technologies staff, children and young people are using both inside and outside of the classroom include:
The increasing prevalence of self-generative artificial intelligence is a growing concern, with pupils potentially having access to tools that generate text and images at home or in school.
These tools not only represent a challenge in terms of accuracy when young people are genuinely looking for information, but also in terms of plagiarism for teachers, and above all, safety. None of the mainstream tools have end-user safety settings and will easily produce inappropriate material despite the age limits that are in place on them.
Beckfoot Trust recognises that since the Covid-19 pandemic, more children have access to the online world in its various forms and therefore we recognise young people are exposed to more online harms than ever before.
3.2 Keeping Children Safe in Education references four areas of risk online within part two, these being:
Content: being exposed to illegal, inappropriate or harmful content, for example: pornography, fake news, racism, misogyny, self-harm, suicide, anti-Semitism, radicalisation, extremism misinformation, disinformation (including fake news) and conspiracy theories.
Contact: being subjected to harmful online interaction with other users; for example: peer to peer pressure, commercial advertising and adults posing as children or young adults with the intention to groom or exploit them for sexual, criminal, financial or other purposes
Conduct: personal online behaviour that increases the likelihood of, or causes, harm; for example, making, sending and receiving explicit images (e.g. consensual and non-consensual sharing of nudes and semi-nudes and/or pornography, sharing other explicit images and online bullying
Commerce: risks such as online gambling, inappropriate advertising, phishing and or financial scams
As with all other risks, it is impossible to eliminate these risks completely. It is therefore essential, through strong educational provision that we build our pupils’ resilience to the risks to which they may be exposed, so that they have the confidence and skills to face and deal with these risks. This involves all stakeholders.
4.1.1 The Trust Board has overall responsibility for monitoring this policy and holding the CEO to account for its implementation, including the scrutiny of filtering and monitoring data.
Online safety will be audited as part of the external safeguarding review, and these reports will be shared with the Trust Board.
All Board members will:
There is a named trustee who has responsibility for Safeguarding and Child Protection. This responsibility includes online safety.
4.2.1 The role of the safeguarding Trustee is to seek further assurance on behalf of Trust Board on how safeguarding is managed in the Trust for the safety and wellbeing of the children. The role includes:
4.2.2 The Executive Member for Safeguarding and the Trust Safeguarding Lead and the safeguarding trustee meet on a regular basis to discuss safeguarding issues and to agree steps to continuously improve safeguarding practices in the trust.
4.3.1 These leaders are responsible for:
4.3.2 They are also responsible for making sure that all staff: understand their role and are appropriately trained to follow policies, processes and procedures and act on reports and concerns.
4.4.1 This leader is responsible for:
4.5.1 This leader is responsible for:
4.6.1 This leader is responsible for:
4.6.2 Working with the Trust Safeguarding Leader to review the Guardian Web Filter Policy elements:
4.7.1 The Headteacher is responsible for ensuring that staff understand this policy, and that it is being implemented consistently throughout the school.
4.7.2 Ensuring that, where necessary, teaching about safeguarding, including online safety, is adapted for vulnerable children, victims of abuse and some pupils with SEND because of the importance of recognising that a ‘one size fits all’ approach may not be appropriate for all children in all situations, and a more personalised or contextualised approach may often be more suitable.
4.8.1 Details of the school Designated Safeguarding Lead (DSL) and Deputies are set out in the school protocol.
4.8.2 Day to day management of filtering and monitoring systems requires the specialist knowledge of both safeguarding and IT staff to be effective. The DSL should work closely together with IT service providers to meet the needs of the setting and may need to ask filtering or monitoring providers for system specific training and support.
4.8.3 The DfE Filtering and monitoring standards for schools and colleges expect that the DSL should take lead responsibility for safeguarding and online safety, which could include overseeing and acting on:
4.8.4 The DSL takes lead responsibility for online safety in school, in particular:
4.9.1 All staff need to be aware of reporting mechanisms for safeguarding and technical concerns. They should report if:
4.9.2 All staff, including contractors and agency staff, and volunteers are responsible for:
4.10.1 Beckfoot Trust would ask that all of our families to support the aims of this policy by:
4.10.2 Parents can seek further guidance on keeping children safe online from the following organisations and websites:
4.11.1 All pupils at in Beckfoot schools are expected to:
See the pupil Acceptable Use Policy for more details.
4.12.1 Visitors and members of the community agree to the terms and conditions of the acceptable use policy (see Appendix 2) when signing in at reception. Safeguarding information sheets are distributed on arrival to make visitors aware of the Trust’s IT systems. Internet access to guest WIFI is time limited and accessible through a code distributed on arrival.
5.1 There are four stages of prevention and action when managing online safeguarding:
5.2 The DfE Filtering and monitoring standards for schools and colleges states clearly that technical monitoring systems do not stop unsafe activities on a device or online. Staff should:
Students will be taught about online safety as part of the curriculum.
In Key Stage 1, students will be taught to:
In Key Stage 2, students will be taught to:
In Key Stage 3, students will be taught to:
In Key Stage 4, students will be taught:
Individual school curriculums should address online safety through the four categories of risk; content, contact, conduct and commerce (See Section 3).
The safe use of social media and the internet will also be covered in other subjects where relevant.
The school will use assemblies to raise students’ awareness of the dangers that can be encountered online and may also invite speakers to talk to students about this.
Where necessary, teaching about safeguarding, including online safety, will be adapted for vulnerable children, victims of abuse and some pupils with SEND.
Individual school curriculums should address online safety through the four categories of risk; content, contact, conduct and commerce (See Section 3).
The safe use of social media and the internet will also be covered in other subjects where relevant.
The school will use assemblies to raise students’ awareness of the dangers that can be encountered online and may also invite speakers to talk to students about this.
Where necessary, teaching about safeguarding, including online safety, will be adapted for vulnerable children, victims of abuse and some pupils with SEND.
Schools will raise parents’ awareness of internet safety in various ways e.g. parents’ evenings, letters, news items etc. through the school website or parental communication systems.
If parents/carers have any queries or concerns in relation to online safety, these should be raised in the first instance with the Headteacher and/or the DSL.
Concerns or queries about this policy can be raised with any member of staff or the Headteacher.
Schools may need to seek further advice if they are concerned parents/carers are not addressing online safety.
9.1 At Beckfoot Trust, we are mindful that the online world is ever developing and we recognise that we must be vigilant in being aware of and responding to new risks that may harm our pupils. For example, the increasing prevalence of self-generative artificial intelligence is a growing concern, with pupils potentially having access to tools that generate text and images at home or in school. These tools not only represent a challenge in terms of accuracy when young people are genuinely looking for information, but also in terms of plagiarism for teachers, and above all, safety. None of the mainstream tools have end-user safety settings and will easily produce inappropriate material despite the age limits that are in place on them.
Against this background, the Ofcom ‘Children and parents: media use and attitudes report 2024’ has shown that an increasing number of younger children are having a presence online, there has been a rise in online gaming activity across children of all ages, and children have been twice as likely as adults to have used artificial intelligence technology.
9.2 We are aware many children and young adults struggle to identify harmful content and challenges online. Incidents which affect the wellbeing and safeguarding of our students include:
9.3 We are mindful other issues that may affect our schools include:
Risk is constantly reviewed at both school and trust level to try to mitigate against concerns as much as possible.
Definition:
Cyber-bullying takes place online, such as through social networking sites, messaging apps or gaming sites. Like other forms of bullying, it is the repetitive, intentional harming of one person or group by another person or group, where the relationship involves an imbalance of power. (See also the school Behaviour Policy.)
To help prevent cyber-bullying, we will ensure that students understand what it is and what to do if they become aware of it happening to them or others. We will ensure that Students know how they can report any incidents and are encouraged to do so, including where they are a witness rather than the victim.
The school will actively discuss cyber-bullying with students, explaining the reasons why it occurs, the forms it may take and what the consequences can be. Class teachers and Tutors will discuss cyber-bullying with their tutor/registration groups, and the issue will be addressed in assemblies.
Teaching staff are also encouraged to find opportunities to use aspects of the curriculum to cover cyber-bullying. This includes personal, social, health and economic (PSHE) education, and other subjects where appropriate.
All staff, board members and volunteers (where appropriate) receive training on cyber-bullying, its impact, and ways to support students, as part of safeguarding training (see section 17 for more detail).
The school also sends information/leaflets on cyber-bullying to parents/carers so that they are aware of the signs, how to report it and how they can support children who may be affected.
In relation to a specific incident of cyber-bullying, the school will follow the processes set out in the school behaviour policy. Where illegal, inappropriate, or harmful material has been spread among students, the school will use all reasonable endeavours to ensure the incident is contained.
The DSL will consider whether the incident should be reported to the police if it involves illegal material and will work with external services if it is deemed necessary to do so.
11.1 It is recognised that extensive mobile device use is detrimental to children’s mental health and wellbeing. However, we understand that many families want older children to have a phone for safety reasons when travelling to and from school. All Beckfoot Trust schools have a policy where mobile devices should be switched off, out of sight, and wherever possible locked away. Please see each school’s local protocol for what a child should do with their mobile device whilst at school. Mobile device usage in lesson time or at social time is not permitted (with the exception of Post-16 students). Please see the Trust behaviour policy and specific school protocol for further guidance.
11.2 Examining electronic devices
School staff have the specific power under the Education and Inspections Act 2006 (which has been increased by the Education Act 2011) to search for and, if necessary, delete inappropriate images or files on Students’ electronic devices, including mobile phones, iPads and other tablet devices, where they believe there is a ‘good reason’ to do so.
When deciding whether there is a good reason to examine or erase data or files on an electronic device, staff must reasonably suspect that the data or file in question has been, or could be, used to:
If inappropriate material is found on the device, it is up to the staff member in conjunction with the DSL or other member of the senior leadership team to decide whether they should:
*Staff may also confiscate devices for evidence to hand to the police, if a pupil discloses that they are being abused and that this abuse includes an online element.
Any searching of students will be carried out in line with:
Any complaints about searching for or deleting inappropriate images or files on students’ electronic devices will be dealt with through the school complaints procedure.
All students, parents, staff, volunteers, and Board members are expected to sign an agreement regarding the acceptable use of the Trust IT systems and the internet (Appendices 1 and 2). Visitors will be expected to read and agree to the Trust terms on acceptable use if relevant.
Use of the Trust internet must be for educational purposes only, or for the purpose of fulfilling the duties of an individual’s role.
We will monitor and filter the websites visited by students, staff, volunteers, Board members and visitors (where relevant) to ensure they comply with the above.
More information is set out in the acceptable use agreements in Appendices 1 and 2.
12.1.1 Employees must not identify themselves as employees of the Trust in their personal ‘social’ online spaces such a X and Facebook. This is to prevent information on these sites from being linked with the Trust and to safeguard the privacy of staff members, particularly those involved in providing sensitive frontline services.
12.1.2 Where employees choose to present themselves in their professional role on sites such as LinkedIn, they must ensure that nothing that they post has the potential to bring the trust, school or profession into disrepute. For safeguarding reasons, as a trust, we do not engage with X (formerly Twitter) and we do not encourage our students to interact with us on this forum. Our Code of Conduct policy (4.10) reminds colleagues of their online responsibilities, particularly in relation to contact with children and families. All employees are also reminded in this policy that they must avoid all electronic communication that might be misconstrued in a way that could damage our Trust’s reputation, even indirectly. Employees have a duty to report any activity from our students or other colleagues that is of concern.
12.1.3 The Trust does not expect employees to discontinue contact with their family members via personal social media once the Trust starts providing services for them. However, any information employees obtain in the course of their employment must not be used for personal gain or be passed on to others who may use it in such a way.
12.1.4 Employees must not have any contact with pupils’ family members through personal social media if that contact is likely to constitute a conflict of interest or call into question their objectivity.
12.1.5 Employees must decline ‘friend requests’ from pupils they receive in their personal social media accounts. Instead, if they receive such requests from pupils of any school who are not family members, they may discuss these in general terms in class where the pupils attend the school and signpost pupils to become ‘friends’ of the official school site if there is one.
12.1.6 Information employees have access to as part of their employment, including personal information about pupils and their family members, colleagues, and other parties and Trust corporate information must not be discussed on their personal online space.
12.1.7 Photographs, videos, or any other types of images of pupils and their families or images depicting employees wearing clothing with school logos on must not be published on personal web space.
12.1.8 Trust/school email addresses and other official contact details must not be used for setting up personal social media accounts or to communicate through such media.
12.1.9 The Trust only permits limited personal use of social media during designated break points. However, employees are expected to devote their contracted hours of work to their professional duties, and, in practice, personal use of the internet should not be in the Trust’s time. This is subject to such use:
12.1.10 Caution is advised when inviting work colleagues to be ‘friends’ in personal social networking sites. Employees are advised that they set the privacy levels of their personal sites as strictly as they can and to opt out of public listings on social networking sites to protect their own privacy. Employees should keep their passwords confidential, change them often and be careful about what is posted online. It is not appropriate to reveal home addresses, telephone numbers and other personal information.
12.2.1 Employees can only use official Trust sites for communicating with pupils or to enable pupils to communicate with one another.
12.2.2 Employees should seek permission from the Headteacher before creating an official Trust related site explaining their business reasons for doing so.
12.2.3 Any official Trust sites created must not breach the terms and conditions of social media service providers, particularly regarding minimum age requirements.
12.2.4 Employees must always act in the best interests of children and young people when creating, participating in or contributing content to social media sites.
12.2.5 If you are contacted for comments about the Trust for publication anywhere, including in any social media outlet please direct the enquiry to the Headteacher.
12.3.2 Any equipment provided to a Trust employee is provided for their sole use. Any use of the equipment by family or friends is not permitted and any misuse of the equipment by unauthorised users will be the responsibility of the staff member.
13.1 Staff members using a work device outside school must not install any unauthorised software on the device and must not use the device in any way which would violate the Trust’s terms of acceptable use, as set out in Appendix 2.
13.2 Staff must ensure that their work device is secure and password-protected, preferably encrypted where possible and practical, and that they do not share their password with others. Any USB, disks or portable hard drives devices containing Trust or school data must be encrypted/password protected.
13.3 Staff must take all reasonable steps to ensure the security of their work device when using it outside school. For example, but not limited to:
If staff have any concerns over the security of their device, they must seek advice from the IT team or Cluster Business Manager.
14.2 Work devices must be used solely for work activities.
14.3 Loss or theft of any work equipment must be reported to the police immediately and IT Team or Cluster Business Manager immediately. Full details of the loss or theft will be required together with the crime reference number for insurance purposes.
15.1.1 In order to ensure that appropriate online filtering is in place across our Trust, Beckfoot Trust uses LGFL School Protect, a cloud-based web filter which is designed specifically for schools. This blocks internet access to harmful sites and inappropriate content, meeting all of the technical requirements set out by the Department for Education and specifically blocking access to illegal content including child sexual abuse material. Our filtering system filters all internet feeds, across all devices and operating systems, providing a dashboard showing online activity and attempts to access any web content that has been blocked. LGFL School Protect identifies the device/IP address (and where possible the individual), time and date of attempted access and the search term or content being blocked.
15.1.2 A managed IT service desk system is in operation and can make real-time changes should a site need to be blocked/un-blocked urgently. As an additional check, the DSL checks that our internet filtering is effective in blocking certain harmful material by using http://testfiltering.com/
15.2.1 In line with DFE IT standards, Beckfoot Trust have keystroke monitoring in place through Smoothwall Monitor, who have been a member of the Internet Watch Foundation since 1st June 2007. Smoothwall Monitor is a real-time, digital monitoring solution that flags safeguarding incidents as they happen when users view or type harmful content. This is able to capture activity that may indicate a risk, even outside of the regular web browser – such as in a Microsoft Word document etc. All Smoothwall Monitor alerts are reported to the DSL via an email alert so that a safeguarding response can be implemented. Where there is an immediate risk of harm, Smoothwall Monitor will phone the school immediately
15.3.1 The Trust (where authorised by the Headteacher) reserves the right to monitor usage of its internet and email services without prior notification or authorisation from users.
15.3.2 Case example: A recent European Court of Human Rights case ruled that an employer was legitimately entitled to access an employee’s social media messenger account. This was because the messages had been sent during working hours, from a work account and on a work device. Therefore, users of the Trust’s email and internet services should have no expectation of privacy in anything they create, store, send or receive using the Trust’s IT system. As such employees should not use the school’s IT resources or communication systems for any matters that are private and confidential.
16.1 Any use of generative AI by staff and students should be carefully considered and assessed, evaluating the benefits and risks of use in the education setting. The intended use should be specified and have clear benefits that outweigh the risks. Safety should not be compromised. Schools should also consider that there may be uses of generative AI by staff or students that have not been explicitly approved or adopted and monitor the suitability and safety of this.
16.2 Our trust follows the age restriction guidance of AI platforms and we do not make these solutions available to students in our schools.
16.3 Staff have access to some generative AI tools through third party applications we use or by unfiltering Chat GPT. We expect staff to consider the following:
17.1 Any breach of this policy will be fully investigated and may lead to disciplinary action being taken against the employee/s involved in line with the Trust’s Disciplinary Policy and Procedure.
17.2 A breach of this policy leading to breaches of confidentiality, or defamation or damage to the reputation of the Trust/school or any illegal act/s that render the Trust/school liable to third parties may result in disciplinary action or dismissal.
17.3 Contracted providers of the Trust’s services must inform the Trust immediately if they become aware of any breaches of this policy so that appropriate action can be taken to protect confidential information and limit damage to the reputation of the Trust.
17.4 Under the Regulation of Investigatory Powers Act (2000) the Trust can exercise the right to monitor the use of the Trust’s/school’s information systems and internet access where it is believed that unauthorised use may be taking place, to ensure compliance with regulatory practices, to ensure standards of service are maintained, to prevent or detect crime, to protect the communications system and to pick up messages if someone is away from school.
17.5 In certain circumstances the Trust will be obliged to inform the Local Authority Designated Officer (LADO) and/or police of any activity where there are concerns that it may constitute a safeguarding issue or potentially involve illegal activity.
18.1 Where a student misuses the Trust’s IT systems or internet, we will follow the procedures set out in the Trust Behaviour Policy and school protocol. The action taken will depend on the individual circumstances, nature, and seriousness of the specific incident, and will be proportionate.
18.2 Where a staff member misuses the Trust’s IT systems or the internet or misuses a personal device where the action constitutes misconduct, the matter will be dealt with in accordance with the staff disciplinary procedures. The action taken will depend on the individual circumstances, nature, and seriousness of the specific incident.
18.3 The Trust will consider whether incidents which involve illegal activity or content, or otherwise serious incidents, should be reported to the police.
18.4 Any incidents which result in the unauthorised access, processing or sharing of personal data this will be considered a data breach under the Trust GDPR Data Protection and FOI Policy and must be notified immediately to the Cluster Business Manager.
19.1 All new staff members will receive training, as part of their induction, on safe internet use and online safeguarding issues including cyber-bullying and the risks of online radicalisation.
19.2 All staff members will receive refresher training at least once each academic year as part of safeguarding training, as well as relevant updates as required (for example through emails, e-bulletins and staff meetings).
By way of this training, all staff will be made aware that:
Training will also help staff:
19.3 The DSL and Deputies will undertake child protection and safeguarding training, which will include online safety, at least every 2 years. They will also update their knowledge and skills on the subject of online safety at regular intervals, and at least annually.
19.4 Board members will receive training on safe internet use and online safeguarding issues as part of their safeguarding training.
19.5 Volunteers will receive appropriate training and updates, if applicable.
More information about safeguarding training is set out in our Child Protection and Safeguarding policy.
This policy will be reviewed every year by the Executive lead for Safeguarding and ratified by the Board of Trustees. Given the ever-changing nature of technology, we will ensure that this review is supported by ongoing risk assessment which reflects current online safety issues that children face. This is important because technology, and the risks and harms related to it, evolve and change rapidly.
We will monitor the impact of the policy using:
This policy will be reviewed annually.