Ealing Logo

EalingChildren's Services Procedures Manual

Online Safety Policy

RELATED GUIDANCE

Child Safety Online: A practical guide for parents and carers whose children are using social media

AMENDMENT

This chapter was reviewed and updated in April 2020.

Contents

  1. Introduction
  2. Working with Children
  3. Supporting Victims and Managing Incidents
  4. Employee Issues and Professional Boundaries
  5. Reporting Abuse and Misuse 

1. Introduction

This document does not supersede any agreements included in the Council's terms and conditions of employment or expectations included in the corporate acceptable use policy or social media policy. All employees should ensure they are aware of the requirements of these policies, which are available on the intranet.

While acknowledging the benefits of internet usage it is also important to recognise that there is a risk to children and young people from this type of technology. It is known that some adults may use the internet to pose as someone from a peer age group and attempt to befriend or meet up with children and young people. In addition to this there is information on the internet concerning weapons, crime, racism, drugs etc., that it is considered inappropriate to access.

Online safety is about keeping children and young people safe from the risks to personal safety and wellbeing when using devices that allow access to the internet as well as those that are used to communicate electronically. This includes mobile phones, gaming consoles, social networking etc.

In order to ensure that children and young people are safe online and are informed of the potential dangers, employees need to have an awareness of the types of sites that children and young people use, and the risks associated with them.

All employees are expected to attend the training available. This can be accessed via the training section.

This policy document aims to provide employees with:

  • An awareness of the dangers and risks faced by children and young people using electronic technology;
  • Guidance for dealing with online safety issues and consequences for children young people, particularly those in care;
  • An appreciation of professional boundaries and electronic technology;
  • A reminder of the Council's expectations on internet usage by employees and the code of conduct.

Foster carers should be referred to the foster carer's handbook for advice on online safety.

The CEOP information sheet will be made available for adopters.

2. Working with Children

Risks

Internet usage (including computers, laptops and mobile devices)

Looked after children should have age appropriate filters and security settings on equipment that they have access to. Social workers and foster carers should discuss the reasons for this with them. 

Web cams

Young people should be cautioned to ensure that web cams are properly turned off or covered securely when they are not in use. There is a risk that unless this is done it may be possible for someone to hack into the computer and watch the young person without them being aware of this.

Mobile phones

The majority of mobile phones have internet access capability and many young people use their phones in a similar way to a computer. It is therefore possible for young people to have instant and unsupervised access to the internet via their mobile phone. Virtually all phones have cameras and videos. This has led to the rise of incidents of violence and/or abuse being recorded and broadcast and "sexting" or "nude selfies" where users record and send indecent images or explicit text messages. Images and messages broadcast in this way are beyond the owner's control once they have been sent.

Inappropriate contact – parents/family members and looked after children

There is a risk that parents and family members who are not permitted to make contact with children in care, or whose contact is restricted, may use social networking and twitter etc. to make direct contact with children in care.

Grooming

Adults who wish to abuse children or young people may pose on the internet as a peer to attempt to make contact and/or meet up with them. The process of grooming may take place over a period of many months using chat rooms, social networking, gaming etc.

Instant messaging and photo/video sharing

Instant messaging is a form of simultaneous real time text communication over the internet. Unlike chat rooms where users are able to speak to strangers in a shared space, instant messaging takes place between people who possess each other's contact details. There is a risk that young people may compromise themselves by sending images and/or inappropriate information. Once these have been shared the child young person has no further control over them. Unlike some chat rooms instant messaging is not moderated.

Instant messaging photo/video sharing applications can be used to share photos and videos on line. Young people may not realise that if a screen shot is taken of the message or picture sent, it may be retained and distributed by the recipient in a way that the young person had not intended.  Images and messages broadcast in this way are beyond the owner's control once a screen shot has been taken.

Chat rooms

The ability to converse with multiple people in the same conversation differentiates chat rooms from instant messaging, which are more typically used for one-to-one communication. Chat rooms may be set up to connect people with shared interests and sometimes have rules that users are expected to follow particularly in rooms designed for children.

Some chat rooms are moderated either by limiting who is allowed to "speak", by having comments approved by moderators (often presented as asking questions of a guest or celebrity), or by having moderation volunteers patrol the venue watching for undesirable behaviour. There is a risk that children and young people may form "friendships" with adults posing as peers with similar interests or other undesirable persons. 

Social networking

Social networking sites allow users to build up networks of friends and mutual friends. They can be used to keep in touch, express opinions, play games, share information, videos, music and photos. Many of the risks associated with chat rooms are applicable to social networking sites with the addition that they are not moderated. Age restrictions applied by most sites can be easily overridden by most young people and are often not compulsory. There is a risk that children and young people may form "friendships" with adults posing as peers with similar interests or other undesirable persons. There is also the risk that they may be subjected to/observe or hear inappropriate language and conversations. There is also a link with cyber bullying (see separate paragraph). Providers usually provide an alert button to be used if users feel that a post is inappropriate or they feel uncomfortable with a particular participant.

Gaming

Online gaming provides young people with the opportunity to play games over the internet and to interact with other gamers within their own friendship group or across the world. This can involve web-based games or games via consoles. Online gaming involves real time where players can interact and speak with each other to complete missions or tasks in pursuit of virtual rewards. As above, there is a risk that children and young people may form "friendships" with adults posing as peers with similar interests or other undesirable persons. There is also the risk that they may be subjected to/observe or hear inappropriate language and conversations. There is also a link with cyber bullying (see below). Gaming platforms are not usually moderated but there is often the facility to report abusive and inappropriate behaviour.

Cyber bullying and abuse

Cyber bullying is bullying through the use of information technology and can include sending threatening or abusive messages, making insulting comments, or making and sharing derogatory or embarrassing videos. Once information has been shared it is out of the originators control and the abuse can spread causing more distress to the victim.

Cyberbullying might be an extension of bullying behaviour that is already happening, but can take place 24/7 and follow victims into their home and other places where they might expect to feel safe. Cyberbullying can take a range of forms including threats, harassment, intimidation, impersonation, exclusion, sexting and manipulation.

The victim may not know who is bullying them online and bullying content can be shared with a large audience very quickly and re-appear frequently.

It may be possible for the young person to collect and retain evidence such as texts and screenshots. It can be empowering for a victim if they have something they can show as evidence of the bullying behaviour they have been exposed to, in the event that they make a disclosure.

Online / Non-Contact Sexual Abuse

Online sexual abuse is where a child or young person is pressured, forced or tricked into any sexual activity online. Non-contact sexual abuse causes as much long term harm to a child or young person as contact sexual abuse. Children who have been forced, tricked or persuaded to participate in the abuse for example by performing sexual acts on themselves describe feeling as though the participated in the abuse and did it to themselves. Children can feel as though they are to blame even although their actions were directed by the offender. Offenders often tell children that they will be the ones in trouble or that no one would believe them if they tell anyone. The existence of images can make it hard for children to feel that the abuse has come to an end. Images and videos may be out there forever.

Streaming and Live Streaming

Children and young people are increasing moving from watching standard TV to streaming their content. This means that they are watching videos or listening to music in real time rather than watching a TV broadcast or downloading a file. Streaming is done using the internet either via a website, an app or by plugging a streaming device into a standard smart TV. The risks of children being exposed to inappropriate content are higher with streamed services than with standard television viewing.

Livestreaming is where a person broadcasts a video in real time. There are apps specifically for this purpose but many social media platforms have this feature. On some apps, several people can livestream together. Livestream can usually continue to be viewed once the live broadcast has ended. The audience can leave comments and 'likes' both during and after the livestream. Children and young people like to livestream for several reasons including taking part in viral trends, to be creative, to learn or share a skill and to stay in contact with friends and family. Livestreams of people playing video games are particularly popular. There are a number of risks whilst livestreaming which must be considered. Children and young people may reveal too much personal information or their location, they can receive negative or nasty responses to their posts, their videos may be recorded or shared without their consent, they may feel pressured to behave in a certain way and they may communicate with people they don't know. Whilst viewing livestreams children and young people may be exposed to adult, inappropriate or upsetting content.

Contextual Safeguarding

Whilst online safety can be a Safeguarding issue for children and young people in its own right, it must also be considered as part of contextual safeguarding. Cases of Child Sexual Exploitation (CSE), Gang Involvement, County Lines, Radicalisation (Prevent) and Grooming for example often see perpetrators and victims making use of digital technology and social media to communicate. Professionals should have a good understanding of online safety issues in order to understand how it may be applied in cases they are working on to help to safeguard the child or young person. Any concerns regarding a child or young person's safety should be referred to ECIRS.

Children with disabilities and special needs

There are many benefits to be gained for children with disabilities and those with special needs from using the internet and social media to support learning and interaction with others. However, this group of children and young people are also particularly vulnerable when using devices that allow access to the internet or to communicate electronically, for example:

  • Children with autistic spectrum disorder may make literal interpretations of content and this may influence how they respond and react;
  • Children with language delays may not understand or misinterpret terminology;
  • Some children with complex needs may not understand the concept of friendship and may be too trusting without an understanding of the risks and be unaware of the types of information it is safe to share on line and which information should not be shared.

Children with disabilities and special needs may also be at particular risk of cyberbullying and abuse. If they should become victims they may not understand that bullying/abuse is happening. This group of children and young people may also not have an understanding of the impact their on line behaviour has on others.

3. Supporting Victims and Managing Incidents

Where a child or young person has been the victim of bullying, abuse or inappropriate behaviour online the worker should identify appropriate support in line with London Child Protection Procedures.

A note should be made on the child's record and the carer informed. The child should be advised not to respond to the abusive contact. Evidence (text messages/e-mails, etc.) should be saved and the Police contacted as appropriate. Police should always be contacted in instances concerning illegal activity, grooming etc. Contact should be made with online providers to have posts/images removed. If the perpetrator of abusive communication is a looked after child, the carer or allocated worker should discuss the consequences with them with a view to education and consider any age appropriate sanctions if deemed necessary.

Where there has been inappropriate contact between a looked after child and a parent or family member, the child must be given practical support to terminate communications and arrangements should be made to ensure that the contact does not resume. Contact must be made with the parent or family member responsible who should be advised of the consequences of repeating the unauthorised contact.

Where a looked after child has viewed what is considered an age inappropriate website the carer or allocated worker should discuss this with them with the aim of providing guidance, education and age appropriate support. Checks should be made to ensure that filtering and security settings are age appropriate.

If a looked after child has used the internet inappropriately the consequences should be discussed with them by the carer or allocated worker with the aim of educating them of the risks and dangers involved. Activity that might be illegal should be discussed with the Head of Service.

The following advice may be helpful for employees when considering what information to give children and young people:

  • Ask permission before using the internet;
  • Tell your carer or a trusted adult if you see anything that makes you feel uncomfortable;
  • Immediately close any webpage you feel uncomfortable with and report to a trusted adult or use the online CEOP button;
  • Do not give out any personal information such as name, address, telephone number, age, school, bank details;
  • Do not give out any passwords and use strong passwords (i.e. not something that another person could easily guess);
  • Ensure you set the correct privacy settings on social networking websites so that not everyone can see your details, pages and photos;
  • Only contact people you have actually met offline;
  • Only accept friend requests from people you have actually met off line;
  • Never arrange to meet someone you have only met on the internet;
  • Only use a webcam with people you have met offline and know;
  • Think very carefully about any pictures and comments you post online as these may be forwarded on without your knowledge or permission and become out of your control;
  • Never be abusive or unkind to anyone on the internet;
  • Only open e-mails from people/organisations you recognise;
  • Avoid using website that you are not happy to tell anyone about;
  • Use a child friendly search engine.

4. Employee Issues and Professional Boundaries

Internet Usage (including computers, laptops and mobile devices)

Whilst at work or using Council equipment employees must not visit internet sites, make, post, download, upload or pass on material remarks, proposals or comments that contain or relate to:

  • Indecent images of children;
  • Promoting discrimination of any kind;
  • Promoting racial or religious hatred;
  • Promoting illegal acts;
  • Violence and bomb making;
  • Illegal taking or promotion of drugs;
  • Adult pornography;
  • Other information that may be offensive to others.

Illegal activity will be reported to the Police. Employees should refer to:

Employees need to be aware of professional boundaries and expectations in relation to the internet and electronic technology usage. Employees should not take photos or videos of children using their personal equipment. Employees should use a Council owned and approved device for permitted photography. Employees must ensure that photos and videos are stored appropriately and that once photos or videos have been uploaded or printed as required they should be deleted from the original device. Employees must ensure that any images temporarily taken home (i.e. if on a trip or visit and the worker cannot return equipment to the office until the next working day) images must be stored securely and in line with data security expectations.

Employees must consider and review the way they use social networking. Security settings should be used to control access to profiles. Employees need to be aware that once published, information including photographs and posts, may be manipulated without consent, used in a different context or distributed in an uncontrolled way.

It is not appropriate for employees to have clients as friends on their social networking site. It is also important for employees to avoid detailed discussion about work on social networking sites to avoid any unintentional lapse in confidentiality. Employees should not upload any work-related images (for example photos/videos taken on trips) or "tag" their location. Employees should only use Council provided equipment to make electronic contact with children and young people. In addition, employees should ensure that all electronic contact with clients is noted in MOSAIC.

If in doubt employees should contact their Manager for advice and/or refer to the Code of Conduct (para 21).

Foster Carers should exercise caution when using social networking sites not to inadvertently reveal details of children they are looking after. Detailed guidance for carers can be found in the Foster Carers Handbook.

5. Reporting Abuse and Misuse

It is the responsibility of all employees and foster carers to report any abuse and misuse of the internet by colleagues to their line manager in the first instance. Employees should refer to the councils Whistleblowing Policy

Employees should also notify the Local Authority Designated Officer (LADO) for Allegations Against Staff and Volunteers within 1 working day, and ensure compliance with the London CP Procedures.

Where there has been inappropriate or illegal use of the internet by an employee:

  • Employees may be subject to the Council's disciplinary process. Accessing certain sites may be considered gross misconduct and may lead to dismissal without notice;
  • Serious breaches and illegal activity will be reported to the Police. The relevant Head of Service and/or LADO must be contacted before this is progressed. A decision will be made as to whether to refer the incident to the audit and investigation team.

If concerns are raised about an employee or representative of another agency these should be reported immediately to the Head of Service and/or LADO.

Where an employee is suspected of accessing illegal or inappropriate sites or has been accused of inappropriate conduct via electronic media the employee Code of Conduct and Council disciplinary procedures apply. An immediate referral should be made to the Head of Service who will contact the LADO and HR to instigate an investigation under the Councils agreed procedures. An early decision needs to be made as to whether the incident should be reported to the Police and/or the Council's Internal Audit and Investigation Team and the Allegations against Staff and Volunteers (ASV) process should be instigated as appropriate.

Depending on the circumstances, and if the Allegations against Staff and Volunteers procedure has been implemented, a decision may be made to suspend an employee while the investigation is on-going. HR will provide support and advice during the implementation of the relevant protocols. Actions might include escorting the employee to his/her work station to retrieve personal effects only. Employees may be instructed to hand over all keys and access cards and all Council equipment including mobile phones, computer tablets, cameras etc. Arrangements should be made to have the employees access to Council systems suspended pending the result of the investigation. It may be considered appropriate to advise the employee not to contact any members of staff or clients direct.