The role of technology in keeping pupils and staff safe online


Category: Education

Share this:
The Role Of Technology In Keeping Pupils And Staff Safe Online Second Banner

E-safety in schools is becoming an increasingly high profile issue, as the explosion in the use of smartphones and social media means that protecting pupils online has become a more daunting prospect than ever.

Steve Smith, Director of Learning at Capita Managed IT Solutions, explains some of the issues and offers a view on the role of technology in keeping pupils and staff safe.

Schools have always had a responsibility to ensure the pupils in their care are as safe as possible. As technology becomes more ubiquitous and more central to all our lives, and as the revolution in consumer technology impacts what happens in schools, the issues have become more complex.

Technology itself obviously has a part to play in protecting the young people that its reach and availability has seemed to place at risk; but there is no silver bullet here.

The human factor is key, and good e-safety is also about awareness and behaviour. It is vital to strike a balance between using the best technologies to protect users and monitor what is going on, and best practice, in respect of leadership, policies, management and training. 

The UK Council for Child Internet Safety puts it superbly:

“…while young people’s ‘offline’ and ‘online’ worlds are often merging, the behaviours and safeguards of the ‘real’ world are not always applied in a ‘virtual’ world where friends can be added at the click of button and information shared in an instant”

The requirements have grown, and teachers and schools face a number of new challenges. Helpfully, there is plenty of advice available from a range of sources out there about their responsibilities and the best ways of meeting them.

The most important starting point is to understand that when we talk about e-safety we are talking about a school’s ability to:

•             Protect its pupils and staff whilst they are using technology

•             Educate its stakeholders about safe practice in their use of technology

•             Intervene and support, where appropriate, when any incident occurs

Risks can come in the form of:

•             Content: being exposed to illegal, inappropriate or harmful material

•             Contact: being subjected to harmful technology based interaction with other users

•             Conduct: personal online behaviour that increases the likelihood of, or causes, harm

Many schools default to relying on increasingly restrictive approaches and technology ‘tools’ to prevent these risks from occurring, yet Ofsted has shown that excessively ‘locked down’ systems can put students at more risk than more lightly ‘managed’ ones.  This is because in the former, pupils are not given enough opportunities to learn how to assess and manage e-safety issues for themselves.   However, the less ‘locked down’ a system is, the more important it is that the technology solutions support leadership and governance across the school.

From a policy perspective, schools should have fully reviewed and regularly updated e-safety/safeguarding/acceptable-use and other relevant policies. These should be clearly stated and articulated often, and should apply to all people on the school site, including governors, visitors, parents, teaching and non-teaching staff and pupils. Policies should be fully risk tested and, particularly in the case of pupils, there should be mechanisms in place to ensure that rules are understood correctly.

Beyond that, whilst Ofsted has explained what it considers ‘outstanding’ in terms of e-safety, and there are several priorities that stand out, other organisations like Regional Broadband Consortia (sometimes called ‘Grids for Learning’) have published advice and even ‘diagnostic’ tools to help schools assess their e-safety arrangements.

All agree that all stakeholders should share responsibility for e-safety, not just management or IT staff, senior leaders, governors, teachers and families should work together to ensure that children are safe, and that all forums, from PSHE classes to assemblies to the wider curriculum,  should be used to discuss and reinforce key messages around e-safety. The-role-of-technology-in-keeping-pupils-and-staff-safe-online-Main-Banner.jpg?mtime=20170904124056#asset:590


To support such ‘best practice’ policy and leadership, a strong technology solution is needed, and expert assistance from a technology partner is crucial too. Every school has different needs, so there is not a single off-the-shelf solution that is the best option for everyone. However, to keep pupils safe – and in order to avoid ‘locking down’ too forcefully, I believe that schools should look at including the following in any technology solution for e-safety:

•             Filtering with a ‘scan ahead’ solution which displays ‘cues’ on pages returned, showing the users who are allowed or blocked, but it should be carefully selected and managed. Too restrictive and pupils will attempt to bypass it on a regular basis, undermining the system, and staff will find it a barrier to teaching and learning - so granular controls are essential. Not restrictive enough and it is not worth having the system in the first place.

•             Enforcement and alerting software should be installed across the entire IT estate. Email filtering may miss a message like ‘I’ll kill you’, but it would be picked up by a screen monitoring enforcement product. A screen shot would then be available to IT staff, informing the organisation of what was sent, who was involved and when the incident took place.

•             Proxy bypass protection solves most common filter avoidance techniques. Although you’ll never successfully entirely prevent access to content you’d rather not have pupils accessing, good proxy bypass solutions should minimise the risk.

•             Regular penetration testing of all solutions should be required. Pupils and staff will always try and subvert any restrictions in place, and will very quickly learn what ‘managed’ solutions are in place and how they operate. It is vital to understand where key vulnerabilities are and how users will try to avoid these systems.

Author: Steve Smith  

Related Blogs

The hugely talented team at Capita Managed IT Solutions have written lots of blogs on similar topics. Click on any of these, which may also be of interest.

View all Blogs

Get to know us better

With over 30 years of experience, customers choose us with confidence to support their organisations

Get in Touch

Partnering with the best

View all Partners
Ms Logo Partners Page Image Oct18
Dell Emc
Hewlett Packard Enterprise
Pure Storage Partners Logo
Lp Partners Logo
Senso Partners Logo
Planet Estream Partner Logo
Hp Partner First Gold