Becky Davies - Maiden Erlegh school reading DSL
Useful website about how to have difficult conversations with chidlren: https://www.educateagainsthate.com/
Subject Case studies: 'How I was Radicalised' Stories:
Why schools should never ignore a concern:
If you are concerned about any person, child or adult relating to development towards extreme views it is important this is flagged at as early a stage possible. this comes under the PREVENT duty which can be completed through the government website.
![](https://static.wixstatic.com/media/d3b85f_b39a28f4e0f24ac489636dfee4457ac1~mv2.png/v1/fill/w_980,h_572,al_c,q_90,usm_0.66_1.00_0.01,enc_auto/d3b85f_b39a28f4e0f24ac489636dfee4457ac1~mv2.png)
Extremism is the holding of extreme political or religious views; fanaticism.Terrorism is
Radicalisation is the action or process of causing someone to adopt radical positions on political or social issues.
Terrorism is the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
Fundamental British Values (FBV) include:
Democracy
The Rule of Law
Individual Liberty
etc.
Examples of types of extremism:
Extreme Right wing
Islamist extremism
Left wing, Anarchist and Single Issue Extremism (LASI Extremism)
'When you're trying to have these difficult conversations with children, look for the humanity in their argument.'
E.g. The innocent people dying on both sides of the Gaza/ Israel war.
Recognising and responding to signs of grooming:
Grooming can take place online or in person
Grooming can lead to exploitation, including sexual exploitation
Vulnerability factors:
Having low self-esteem or being isolated
Feeling rejection, discrimination or injustice
Experiencing community tensions between groups
Experiencing a traumatic event
Struggling with a sense of identity or belonging
Warning signs of Radicalisation:
Spend increasing amounts of time talking to people with extreme views
Change in their style of dress or appearance
Becoming increasingly argumentative
Refusing to listen to different points of view
Unwilling to engage with children who are different
Becoming abusive to children who are different
Embracing conspiracy theories
Feeling persecuted
Changing friends and appearance
Distancing themselves from old friends
No longer doing things they used to enjoy
Converting to a new religion
Being secretive and reluctant to discuss their whereabouts
Sympathetic to extremist ideologies and groups
Warning signs observed through online behaviour:
Changing online identity
Having more than one online identity
Spending a lot of time online or on the phone
Accessing extremist online content
Joining or trying to join an extremist organisation
What Can Schools do?
Include radicalisation in your safeguarding policies and procedures
Identify those at risk and make sure everyone in your organisation knows when to report a concern
Work in partnership with other organisations across the community.
Promote positive messages of tolerance and community cohesion
Help parents and children get support
Channel
A voluntary confidential programme which safeguards people identified as susceptible to being drawn into terrorism.
It is a multi-agency process, involving partners from the local authority, the police, education, health providers and others.
When someone makes a referral, lots of agencies work together to offer support where they consider it necessary and proportionate to do so. This involves a number of steps:
1. The local authority and the police carefully assess all referrals to see if they are suitable for Channel or whether a different type of support is more appropriate, such as mental health support.
2. If suitable, the referral is discussed with all relevant partners at a meeting called a Channel panel to decide if an intervention is necessary. The individual who has been referred to Prevent is informed and must give their consent (or via a parent or guardian if they are children) before an intervention can take place.
3. If Channel intervention is required, the panel works with local partners to develop an appropriate tailored support package.
4. The support package is monitored closely and reviewed regularly by the Channel panel.
More information can be founf at: https://www.gov.uk/government/case-studies/the-channel-programme
The Trust Network
How it is monitored - Mr Mike Gomm.
Network Monitoring
Everything you do using IT (All applications used, all internet activity as it happens) across the Maiden Erlegh Trust is Monitored. It is done to protect the users and to protect the integrity of the computer network.
This includes access to Google docs, Office 365 and individual youtube videos
Data Protection Act, UK GDPR Update
First introduced in 1992
To ensure that adequate data protection is incorporated into all processes. (By default and by design). It has to become an ongoing way of life (Common sense must prevail).
What is personal data and what is sensitive data?
(Data can be stored in any form: Including in pencil and as photographs.)
Personal Data is 'Any information relating to an individual.'...Whether it relates to his or her private, professional or public life.
Sensitive data is 'special categories of personal data'. It is effective professional practice to treat all data as sensitive data.
Security of Data
If anything happens report it immediately, loss of data, for example being stolen in a bag, places the data in the public domain and all those whose data is breached have a right to know as soon as possible.
Subject Access Requests
What does this mean to me?
Information which is processed by the teacher solely for their own use is excluded from SAR.
Care with codes
40,000 emails about a student
Can you recognise a SAR?
Online Services
Delete old posts
Care with trials of websites - check if students can access websites without signing up for them
Students will try very hard to find your online presence.
Good practice
You are allowed to use your phone in school.
Be careful, however to note where your recorded data backs up to.
Care with Family devices
Do not use USB memory sticks - they do not work in school computers
Care with paper records
Emails:
Only put student initials in subject line, but please do put students' full name in the main text.
Not a filing system
Delete anything over 6 months old
Do not forget to purge sent folder
Do not use personal email addresses at all when dealing with school matters
You can check if someone is in fact at the school by forwarding it to someone else. (Phishing)
Response time for communications with parents - 72 hours. Do not be afraid to send holding emails.
Careful with what you write and the language that you use
Passwords will expire every 90 days.
Data breach - Report it, Record what happened, do not hide it.
Ask them to delete it and ask them to confirm to you that you have deleted it.
Check Bromcom permissions or ask the class before you take photos.
Comentários