Design note 4 - what do we mean?
In addition to the similarities between our new icon and the real Northern Lights, we particularly liked some of the themes the Northern Lights icon represented, namely:
In addition to the similarities between our new icon and the real Northern Lights, we particularly liked some of the themes the Northern Lights icon represented, namely:
To complement our dynamic new Northern Lights icon, we needed a strong colour pallette and confident, contemporary font.
The contrasting yet complimentary colours in our logo symbolises our value of diversity and unity. We often talk about 'the same but different' at Beckfoot Trust to acknowledge that whilst we have a very clear One Trust identity and clarity on what remarkable means, we also know that one size does not always fit all.
Perhaps the most important part of our new Beckfoot Trust logo is the icon, shown to the right here.
We call it our Northern Lights.
In nature, the Northern Lights are seen as something unique and truly Remarkable that are associated with the North.
Our Northern Lights icon represents The Beckfoot Trust which is also on a constant journey to Remarkable and is strongly associated with the North of England.
As part of our ongoing Journey to Remarkable we felt it was important to give The Beckfoot Trust a strong, confident and contemporary logo and brand that was worthy of an organisation with such high standards and aspirations.
The new Trust logo was a departure from the previous logo style and was definitely designed with the future in mind.
1.1 Beckfoot Trust recognises that Information and Communications Technology (ICT) in a useful resource to support teaching and learning and is an inevitable feature in the everyday lives of children, young people and adults.
1.2 We also recognises that the use of technology has also become a significant component of many safeguarding issues, including Child Sexual Exploitation, radicalisation, child on child abuse and sexual harassment, and understands that technology can be used as a platform to facilitate harm.
1.3 Beckfoot Trust aims to protect and educate students and adults in their use of technology and has in place mechanisms to identify, intervene in, and escalate any incident where appropriate. It recognises the vulnerability of students with SEND online.
1.4 Beckfoot Trust ensures that each school has appropriate filters and monitoring systems in place to safeguard children from potentially harmful and inappropriate online material and does all it reasonably can to limit students’ exposure to the above risks from the School’s IT system. Students’ access to the internet via their personal mobile devices on school premises is limited and regulated. As part of our safeguarding practice staff accounts are also monitored too.
This policy is based on the Department for Education’s (DfE) statutory safeguarding guidance, Keeping Children Safe in Education. Also, the following DfE advice for schools:
It reflects existing legislation, including but not limited to the Education Act 1996 (as amended), the Education and Inspections Act 2006 and the Equality Act 2010. In addition, it reflects the Education Act 2011, which has given teachers stronger powers to tackle cyber-bullying by, if necessary, searching for and deleting inappropriate images or files on students’ electronic devices where they believe there is a ‘good reason’ to do so.
The policy also takes into account the National Curriculum: computing programmes of study and the Online Safety Act 2023.
3.1 ICT covers a wide range of resources including web-based and mobile learning. It is also important to recognise the constant and fast paced evolution of ICT within our society. Currently the internet technologies staff, children and young people are using both inside and outside of the classroom include:
The increasing prevalence of self-generative artificial intelligence is a growing concern, with pupils potentially having access to tools that generate text and images at home or in school.
These tools not only represent a challenge in terms of accuracy when young people are genuinely looking for information, but also in terms of plagiarism for teachers, and above all, safety. None of the mainstream tools have end-user safety settings and will easily produce inappropriate material despite the age limits that are in place on them.
We recognise that the continued cost-of-living crisis has meant that many children have spent more time online and, as a result, are potentially exposed to all manner of online harms.
3.2 Keeping Children Safe in Education 2024 references four areas of risk online within part two, these being:
Content: being exposed to illegal, inappropriate or harmful content, for example: pornography, fake news, racism, misogyny, self-harm, suicide, anti-Semitism, radicalisation and extremism.
Contact: being subjected to harmful online interaction with other users; for example: peer to peer pressure, commercial advertising and adults posing as children or young adults with the intention to groom or exploit them for sexual, criminal, financial or other purposes
Conduct: personal online behaviour that increases the likelihood of, or causes, harm; for example, making, sending and receiving explicit images (e.g consensual and non-consensual sharing of nudes and semi-nudes and/or pornography, sharing other explicit images and online bullying
Commerce: risks such as online gambling, inappropriate advertising, phishing and or financial scams
As with all other risks, it is impossible to eliminate these risks completely. It is therefore essential, through strong educational provision that we build our pupils’ resilience to the risks to which they may be exposed, so that they have the confidence and skills to face and deal with these risks. This involves all stakeholders.
The Trust Board has overall responsibility for monitoring this policy and holding the CEO to account for its implementation, including the scrutiny of filtering and monitoring.
Online safety will be audited as part of the external safeguarding review, and these reports will be shared with the Trust Board.
There is a Trustee who has responsibility for Safeguarding and Child Protection. This responsibility includes online safety.
4.2.1 The role of the safeguarding Trustee is to seek assurance on behalf of Trust Board on how safeguarding is managed in the Trust for the safety and wellbeing of the children. The role includes:
4.2.2 The Executive Member for Safeguarding and the Trust Safeguarding Lead and the safeguarding trustee meet on a regular basis to discuss safeguarding issues and to agree steps to continuously improve safeguarding practices in the trust.
All Board members will:
4.3.1 The leader is responsible for:
4.3.2 They are also responsible for making sure that all staff: understand their role and are appropriately trained to follow policies, processes and procedures and act on reports and concerns.
This leader is responsible for:
4.5.1 This leader is responsible for:
4.6.1 This leader is responsible for:
4.6.2 Working with the Trust Safeguarding Leader to review the Guardian Web Filter Policy elements:
The Headteacher is responsible for ensuring that staff understand this policy, and that it is being implemented consistently throughout the school.
The school has undertaken the advised 360 evaluation of online safety (360 safe website) and has an action plan where any gaps have been identified.
4.8.1 Details of the school Designated Safeguarding Lead (DSL) and Deputies are set out in the school protocol.
4.8.2 Day to day management of filtering and monitoring systems requires the specialist knowledge of both safeguarding and IT staff to be effective. The DSL should work closely together with IT service providers to meet the needs of the setting and may need to ask filtering or monitoring providers for system specific training and support.
4.8.3 The DfE Filtering and monitoring standards for schools and colleges expect that the DSL should take lead responsibility for safeguarding and online safety, which could include overseeing and acting on:
4.8.4 The DSL takes lead responsibility for online safety in school, in particular:
This list is not intended to be exhaustive.
4.9.1 All staff need to be aware of reporting mechanisms for safeguarding and technical concerns. They should report if:
4.9.2 All staff, including contractors and agency staff, and volunteers are responsible for:
This list is not intended to be exhaustive.
4.10.1 Beckfoot Trust would ask all of our parents and carers to support the aims of this policy by:
Parents/Carers can seek further guidance on keeping children safe online from the following organisations and websites:
Visitors and members of the community agree to the terms and conditions of the acceptable use policy (see appendix 2) when signing in at reception. Safeguarding information sheets are distributed on arrival to make visitors aware of the Trust’s IT systems. Internet access tp guest WIFI is time limited and accessible through a code distributed on arrival.
There are four stages of prevention and action when managing online safeguarding:
The DfE Filtering and monitoring standards for schools and colleges states clearly that technical monitoring systems do not stop unsafe activities on a device or online. Staff should:
Students will be taught about online safety as part of the curriculum.
In Key Stage 1, students will be taught to:
In Key Stage 2, students will be taught to:
In Key Stage 3, students will be taught to:
In Key Stage 4, students will be taught:
Individual school curriculums should address online safety through the four categories of risk; content, contact, conduct and commerce (See Section 3).
The safe use of social media and the internet will also be covered in other subjects where relevant.
The school will use assemblies to raise students’ awareness of the dangers that can be encountered online and may also invite speakers to talk to students about this.
Where necessary, teaching about safeguarding, including online safety, will be adapted for vulnerable children, victims of abuse and some pupils with SEND.
Schools will raise parents’ awareness of internet safety in various ways e.g. parents’ evenings, letters, news items etc. through the school website or parental communication systems.
If parents/carers have any queries or concerns in relation to online safety, these should be raised in the first instance with the Headteacher and/or the DSL.
Concerns or queries about this policy can be raised with any member of staff or the Headteacher.
Schools may need to seek further advice if they are concerned parents/carers are not addressing online safety.
A hoax is a deliberate lie designed to seem truthful, and online challenges generally involve users recording themselves taking a challenge, and then distributing the video through social media channels, inspiring or daring others to repeat the challenge.
We are aware there are many children and young adults who struggle to identify harmful online challenges and online hoaxes.
DSLs together with the IT service will undertake a case-by-case assessment, establishing the scale and nature of the possible risk to our children and young people, including considering if the risk is national, local, or school related.
Where the assessment finds an online challenge to be putting pupils at risk of harm, e.g. it encourages children to participate in age-inappropriate activities that could increase safeguarding risks or become a child protection concern, they will ensure that the challenge is directly addressed to the relevant pupils, e.g. those within a particular age range that is directly affected or even to individual children at risk where appropriate.
We will provide appropriate guidance and which audiences this needs to go to following each assessment.
Definition:
Cyber-bullying takes place online, such as through social networking sites, messaging apps or gaming sites. Like other forms of bullying, it is the repetitive, intentional harming of one person or group by another person or group, where the relationship involves an imbalance of power. (See also the school Behaviour Policy.)
To help prevent cyber-bullying, we will ensure that students understand what it is and what to do if they become aware of it happening to them or others. We will ensure that Students know how they can report any incidents and are encouraged to do so, including where they are a witness rather than the victim.
The school will actively discuss cyber-bullying with students, explaining the reasons why it occurs, the forms it may take and what the consequences can be. Class teachers and Tutors will discuss cyber-bullying with their tutor/registration groups, and the issue will be addressed in assemblies.
Teaching staff are also encouraged to find opportunities to use aspects of the curriculum to cover cyber-bullying. This includes personal, social, health and economic (PSHE) education, and other subjects where appropriate.
All staff, board members and volunteers (where appropriate) receive training on cyber-bullying, its impact, and ways to support students, as part of safeguarding training (see section 17 for more detail).
The school also sends information/leaflets on cyber-bullying to parents/carers so that they are aware of the signs, how to report it and how they can support children who may be affected.
In relation to a specific incident of cyber-bullying, the school will follow the processes set out in the school behaviour policy. Where illegal, inappropriate, or harmful material has been spread among students, the school will use all reasonable endeavours to ensure the incident is contained.
The DSL will consider whether the incident should be reported to the police if it involves illegal material and will work with external services if it is deemed necessary to do so.
10.1.1 Trust schools may have different approaches to use of mobile devices in schools which should be reflected in the school’s Positive Learning Strategy or Behaviour Protocol.
10.1.2 Students may bring mobile devices into school, but are not permitted to use them during:
10.1.3 Any use of mobile devices in Trust schools by students must be in line with the acceptable use agreement (see Appendix 1) and the school local behaviour protocol.
10.1.4 Any breach of the acceptable use agreement by a student may trigger disciplinary action in line with the Trust Behaviour Policy and school protocol, which may result in confiscation of their device.
School staff have the specific power under the Education and Inspections Act 2006 (which has been increased by the Education Act 2011) to search for and, if necessary, delete inappropriate images or files on Students’ electronic devices, including mobile phones, iPads and other tablet devices, where they believe there is a ‘good reason’ to do so.
When deciding whether there is a good reason to examine or erase data or files on an electronic device, staff must reasonably suspect that the data or file in question has been, or could be, used to:
If inappropriate material is found on the device, it is up to the staff member in conjunction with the DSL or other member of the senior leadership team to decide whether they should:
*Staff may also confiscate devices for evidence to hand to the police, if a pupil discloses that they are being abused and that this abuse includes an online element.
Any searching of students will be carried out in line with:
Any complaints about searching for or deleting inappropriate images or files on students’ electronic devices will be dealt with through the school complaints procedure.
All students, parents, staff, volunteers, and Board members are expected to sign an agreement regarding the acceptable use of the Trust IT systems and the internet (Appendices 1 and 2). Visitors will be expected to read and agree to the Trust terms on acceptable use if relevant.
Use of the Trust internet must be for educational purposes only, or for the purpose of fulfilling the duties of an individual’s role.
We will monitor and filter the websites visited by students, staff, volunteers, Board members and visitors (where relevant) to ensure they comply with the above.
More information is set out in the acceptable use agreements in Appendices 1 and 2.
11.1.1 Employees must not identify themselves as employees of the Trust in their personal web space. This is to prevent information on these sites from being linked with the Trust and to safeguard the privacy of staff members, particularly those involved in providing sensitive frontline services.
11.1.2 The Trust does not expect employees to discontinue contact with their family members via personal social media once the Trust starts providing services for them. However, any information employees obtain in the course of their employment must not be used for personal gain or be passed on to others who may use it in such a way.
11.1.3 Employees must not have any contact with pupils’ family members through personal social media if that contact is likely to constitute a conflict of interest or call into question their objectivity.
11.1.4 If employees wish to communicate with pupils through social media sites or to enable pupils to keep in touch with one another, they can only do so with the approval of the Trust and through official Trust sites created according to the requirements specified in section 11.
11.1.5 Employees must decline ‘friend requests’ from pupils they receive in their personal social media accounts. Instead, if they receive such requests from pupils of any school who are not family members, they may discuss these in general terms in class where the pupils attend the school and signpost pupils to become ‘friends’ of the official school site if there is one.
11.1.6 Information employees have access to as part of their employment, including personal information about pupils and their family members, colleagues, and other parties and Trust corporate information must not be discussed on their personal web space.
11.1.7 Photographs, videos, or any other types of images of pupils and their families or images depicting employees wearing clothing with school logos on must not be published on personal web space.
11.1.8 Trust/school email addresses and other official contact details must not be used for setting up personal social media accounts or to communicate through such media.
11.1.9 The Trust only permits limited personal use of social media during designated break points. However, employees are expected to devote their contracted hours of work to their professional duties, and, in practice, personal use of the internet should not be in the Trust’s time. This is subject to such use:
11.1.10 Caution is advised when inviting work colleagues to be ‘friends’ in personal social networking sites. Employees are advised that they set the privacy levels of their personal sites as strictly as they can and to opt out of public listings on social networking sites to protect their own privacy. Employees should keep their passwords confidential, change them often and be careful about what is posted online. It is not appropriate to reveal home addresses, telephone numbers and other personal information. It is a good idea to use a separate email address just for social networking so that any other contact details are not given away.
11.2.1 Employees can only use official Trust sites for communicating with pupils or to enable pupils to communicate with one another.
11.2.2 Employees should seek permission from the Headteacher before creating an official Trust related site explaining their business reasons for doing so.
11.2.3 Any official Trust sites created must not breach the terms and conditions of social media service providers, particularly regarding minimum age requirements.
11.2.4 Employees must always act in the best interests of children and young people when creating, participating in or contributing content to social media sites.
11.2.5 If you are contacted for comments about the Trust for publication anywhere, including in any social media outlet please direct the enquiry to the Headteacher.
11.3.1 Staff who use the Trust’s IT and communication systems:
11.3.2 Any equipment provided to a Trust employee is provided for their sole use. Any use of the equipment by family or friends is not permitted and any misuse of the equipment by unauthorised users will be the responsibility of the staff member.
11.4.1 The following uses of IT are prohibited, may amount to gross misconduct, and could result in dismissal. Please see the Disciplinary Policy for further guidance.
12.1 Staff members using a work device outside school must not install any unauthorised software on the device and must not use the device in any way which would violate the Trust’s terms of acceptable use, as set out in Appendix 2.
12.2 Staff must ensure that their work device is secure and password-protected, preferably encrypted where possible and practical, and that they do not share their password with others. Any USB, disks or portable hard drives devices containing Trust or school data must be encrypted/password protected.
12.3 Staff must take all reasonable steps to ensure the security of their work device when using it outside school. For example, but not limited to:
13.1 It is a condition of the Trust Insurance Policy that whenever hardware e.g., laptops and mobile phones are left in an unattended vehicle, they must be kept out of sight in a luggage compartment, glove compartment, or similar container and all windows or openings must be closed and all doors locked. If the items are left in an unattended vehicle overnight, the vehicle must be in a secure or attended garage or compound. In the event of a theft, failure to adhere to these conditions will result in an insurance claim being refused.
If staff have any concerns over the security of their device, they must seek advice from the IT team or Cluster Business Manager.
13.2 Work devices must be used solely for work activities.
13.3 Loss or theft of any work equipment must be reported to the police immediately and IT Team or Cluster Business Manager immediately. Full details of the loss or theft will be required together with the crime reference number for insurance purposes.
10.5.1 The Trust (where authorised by the Headteacher) reserves the right to monitor usage of its internet and email services without prior notification or authorisation from users.
14.1 The Trust (where authorised by the Headteacher) reserves the right to monitor usage of its internet and email services without prior notification of authorisation from users.
14.2 Case example: A recent European Court of Human Rights case ruled that an employer was legitimately entitled to access an employee’s social media messenger account. This was because the messages had been sent during working hours, from a work account and on a work device. Therefore, users of the Trust’s email and internet services should have no expectation of privacy in anything they create, store, send or receive using the Trust’s IT system. As such employees should not use the school’s IT resources or communication systems for any matters that are private and confidential.
15.1 Any breach of this policy will be fully investigated and may lead to disciplinary action being taken against the employee/s involved in line with the Trust’s Disciplinary Policy and Procedure.
15.2 A breach of this policy leading to breaches of confidentiality, or defamation or damage to the reputation of the Trust/school or any illegal act/s that render the Trust/school liable to third parties may result in disciplinary action or dismissal.
15.3 Contracted providers of the Trust’s services must inform the Trust immediately if they become aware of any breaches of this policy so that appropriate action can be taken to protect confidential information and limit damage to the reputation of the Trust.
15.4 Under the Regulation of Investigatory Powers Act (2000) the Trust can exercise the right to monitor the use of the Trust’s/school’s information systems and internet access where it is believed that unauthorised use may be taking place, to ensure compliance with regulatory practices, to ensure standards of service are maintained, to prevent or detect crime, to protect the communications system and to pick up messages if someone is away from school.
15.5 In certain circumstances the Trust will be obliged to inform the Local Authority Designated Officer (LADO) and/or police of any activity where there are concerns that it may constitute a safeguarding issue or potentially involve illegal activity.
16.1 Where a student misuses the Trust’s IT systems or internet, we will follow the procedures set out in the Trust Behaviour Policy and school protocol. The action taken will depend on the individual circumstances, nature, and seriousness of the specific incident, and will be proportionate.
16.2 Where a staff member misuses the Trust’s IT systems or the internet or misuses a personal device where the action constitutes misconduct, the matter will be dealt with in accordance with the staff disciplinary procedures. The action taken will depend on the individual circumstances, nature, and seriousness of the specific incident.
16.3 The Trust will consider whether incidents which involve illegal activity or content, or otherwise serious incidents, should be reported to the police.
16.4 Any incidents which result in the unauthorised access, processing or sharing of personal data this will be considered a data breach under the Trust GDPR Data Protection and FOI Policy and must be notified immediately to the Cluster Business Manager.
17.1 All new staff members will receive training, as part of their induction, on safe internet use and online safeguarding issues including cyber-bullying and the risks of online radicalisation.
17.2 All staff members will receive refresher training at least once each academic year as part of safeguarding training, as well as relevant updates as required (for example through emails, e-bulletins and staff meetings).
By way of this training, all staff will be made aware that:
Training will also help staff:
17.3 The DSL and Deputies will undertake child protection and safeguarding training, which will include online safety, at least every 2 years. They will also update their knowledge and skills on the subject of online safety at regular intervals, and at least annually.
17.4 Board members will receive training on safe internet use and online safeguarding issues as part of their safeguarding training.
17.5 Volunteers will receive appropriate training and updates, if applicable.
More information about safeguarding training is set out in our Child Protection and Safeguarding policy.
The DSL or Deputies will log behaviour and safeguarding issues related to online safety, using CPOMs.
This policy will be reviewed annually.
The review will be supported by an annual risk assessment and information gathered by the external safeguarding reviews which considers and reflects the risks pupils face online. This is important because technology, and the risks and harms related to it, evolve, and change rapidly.