Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Information Security & eSafety

No description
by

Nick Gillott

on 13 November 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Information Security & eSafety

Nick Gillott - Programme and Projects Manager
Louise Whitworth - Chief Records and Information Manager Information Security and eSafety Review key aspects of esafety for young people

Review information Security and update on key developments Objectives OFSTED eSafety Data Protection Act 2008
Protection of Freedoms Act 2012
Information Commissioner Information Security We need to protect others and ourselves! Information Security and Computer Usage Policy
Information Classification and Handling Protocol New! It also covers...... Information stored and transmitted on.....
Databases - SIMS
Staff PCs and Laptops
Network Drives
Learning Platforms
Tablet PCs - iPads, Android etc
Mobile Phones
Mobile Storage - External Hard Drives, USB Memory Pens etc
Web Based Systems - iTracker etc......... Fine or No Fine? Teacher takes paperwork relating to safeguarding of a child home in their handbag to work on later. She calls at a coffee shop on the way home to meet a friend and her handbag is stolen. FINE! School Business Manager has just been given access to a new financial system. He has set his password to be ‘complex’ and is the same as his network password. He also uses this password for his access to SIMS, the schools website, and a document management system holding pupil and staff personal files. A Pupil has discovered the password used to access the school website and has used it to access other systems Fine or No Fine? Fine or No Fine? The school SENCO has updated two separate child statements. She has sent these updates to the printer and collects them immediately. She then posts them out to the parents using first class royal mail. Two days later it is revealed that both child statements have inadvertently been sent to the parents of one of the children. Fine or No Fine? The Deputy Headteacher has been involved with a small number of staff in a serious case review of a child. He has set up a distribution list in his email for the case and has sent information from the review to this list. One of the email addresses on the list has been mistyped and the information received by another member of staff not involved in the case. The case review continues and further information is sent by the deputy head to the same distribution list. This time he has encrypted the attached file and sends a separate email with the password to open the attachment to the same list. Fine or No Fine? Strawberry Fields Academy has just moved into its brand new building. Part of the move involved kitting out the school with brand new PCs and IT kit. The Academy have decided to support the community by selling all their old PCs at knock down prices for those most underprivileged. They subcontract a company to wipe all the data from the PCs and sell them on behalf of the academy. Later it transpires that the hard drives were not wiped and the PCs found their way for sale onto the internet. A data recovery company has 4 PCs and reported that they have found personal data on them. Fine or No Fine? Classification Scheme A recent Ofsted report, ICT in Schools 2008-11, mentions e-safety in schools. It notes that all the schools visited for the three-year survey ensured that pupils were well informed about the safe use of the internet and were able to use it in a responsible and safe way. However, the need for continued vigilance was emphasised by the fact that in discussions with inspectors, pupils frequently raised the issue of the under-age use of social networking sites. OFSTED Another survey report, The safe use of technologies, which we published in February 2010, found that pupils who are given greater freedom at school to use new technologies have a better knowledge and understanding of how to stay safe online
Pupils were more vulnerable overall when schools with ‘locked systems’ restricted access to almost every site; they were not given enough opportunity to learn how to assess and deal with online risk for themselves. A3
ASL
BGWM
CUIMD
FYEO
LDR
PIR
PRW
TMIY
Do you know what the kids know? eSafety iSecurity Keeping Information Safe Keeping Others Safe Passwords
Grooming
Pupil Data
Personal Information Behaviours
Cyberbullying
Grooming
Inappropriate Content Opportunities
Education and Learning
Social Connection
Creativity Behaviours
Using Information Responsibly
Keeping the Organisations Information Safe NO FINE If you don't know about the need to protect kids online.... 89% of sexual solicitations are made in chat rooms or on IM
1 in 5 kids aged 10-17 have been solicited sexually online
1 in 3 kids have been contacted by a stranger half of which were inappropriate
There are now more than 800 million active Facebook users
45% of kids online have been asked for personal info from people they don't know
Between 2007-9 MySpace deleted 90,000 accounts created by registered sex offenders
36 percent of respondents said "they wish they could go back to a time before Facebook
The average user has 130 friends and is connected to 80 pages, events and groups
In Summary Look to declassify information
Ensure you don't pass information to another body without assessing their handling processes
Ensure information exchange, storage and deletion is appropriate to the level of sensitivity Any Questions?
Full transcript