E Safety Policy

Kemball School

E-Safety Policy


The primary concern is that every child stays safe. Kemball School is committed to safeguarding and promoting the welfare of every child and employee.  Kemball School recognises the importance of technology in today’s world and the need for our pupils to be confident users. Technology also serves as an area of great motivation for many young people at Kemball school and we are keen to use this interest to take their learning forward in all areas of the curriculum. Technologies have changed significantly during the last decade as has the range of pupil’s abilities at Kemball School. The area of E-Safety is reviewed continually as new developments in technology continue to keep our interest and that of the pupils and parents. The continuous review of our use of technology is a priority to develop a safe environment for pupils and staff.

In November 2016 we gained an E-Safety accreditation from 360 degree safe, this was renewed via a desktop assessment and the accreditation renewed on June 18th 2019.

Policy content

Our school e-safety policy will include the following sections:

  • Using the internet
  • School Website 
  • E-Mail
  • Video Conferencing
  • Our School network related to virus infection
  • Emerging Technologies
  • Staff use of the School Computer equipment and Network.
  • E-Safety and Forensic software
  • Procedures for handling e-safety complaints
  • Sanctions


Using the internet

Pupils using the internet will usually logon using their class name and password. Individual passwords are developed and introduced to those pupils whom it is felt are ready for this. All pupils will be supervised with internet use. Pupils that can access the internet independently are encouraged to use it in order to further their learning in all areas of the curriculum.  This work is still supervised by staff.  All pupils will have access to resources from the internet, e.g. downloaded sensory programmes or images related to a topic. The school will maintain a current record of all pupils who are granted access to the school’s electronic communications.

The authority has a filtering policy on the use of search engines. We have taken the decision to not filter “Google images “ or Youtube. This is because the majority of our pupils require images rather than text to access information. It is acknowledged that, in our school, the problem of pupils using images/material inappropriately is severely limited by their general ability.  However it is recognised as an issue and will be taken seriously and monitored accordingly. As will other online risk of harm including child sexual exploitation. Every teacher is aware of the risks posed by the online activity of extremist and terrorist groups and annual training takes place either via external agencies – eg via Prevent or through the schools E-Safety coordinator.


School Website


The Head Teacher and Business Manager have the passwords allowing them to edit the school website. School staff will input towards what is placed on the website. Pupils’ full names will not be used anywhere on the website.  To ensure our pupils are safeguarded, no pupil photographs will be published on the school websiteThe contact details on the website should be the school address, e-mail and telephone number. Staff or pupils’ personal information will not be published. E-mail addresses are published carefully, to avoid spam harvesting.


Some pupils now have individual logins and passwords for email.  Staff email accounts continue to be used for whole class e-mail activities where this is more appropriate. All use of e-mail at our school will be closely supervised. All staff have an e-mail address using the Kemball school accounts. This should be used for issues related to school work as the network is secure and adheres to the principles of GDPR. Kemball to Kemball emails are secure.  When sending a secure email to a none Kemball email address, CONFIDENTIAL: should be typed into the subject line or attachments should be password protected.

Private e-mail such as web based accounts cannot be used because of the filtering policy of the local authority.

The anti bullying policy refers to the increased possibility of the misuse of ICT resources including e-mail.  This will be monitored by using the forensic software.  

Video Conferencing

 Following the past few months where the country has been in lockdown Kemball school recognise that there has been a surge in video conferencing. Upon their return some pupils are likely to be expert users when using software such as FaceTime, Zoom and Skype. Guided access is to be used where possible to prevent pupils using this and discussions surrounding the appropriateness of this within school will be held where needed. Staff have been made aware that this may be an E-Safety issue and will be very vigilant when pupils are around technologies.

Where staff are required to use video conferencing for meetings etc this is to take place in classroom pods on evidence for learning iPad or ideally in a room away pupils. Doors are to be kept closed throughout and under no circumstances are any images of pupils to be on the call.

School network - virus infection

This is maintained by technicians from RM.  An updated virus and firewall system is installed. RM manage the various security updates to ensure the network is virus free. Our wireless network is a secure network with a Wired Equivalent Privacy key. Presently visiting technicians, some other professionals and staff using their laptops are allowed to connect to the network.  To prevent potential viruses corrupting the school system, staff should not use any memory sticks/external hard drives on school computers that have been used on personal machines

Emerging Technology

New technologies are developing very quickly. Some of these facilities are not used at our school at the moment but it is important for staff to be aware of the developments. The use of some of this new technology will be developed in future years. Emerging technology is an ongoing area of continuous development. The computing coordinator is also the E-Safety lead and has set up a book where instances can be recorded. The instances in this book feed into a half termly E-Safety session accessed by pupils to whom this is relevant.

Areas to consider: mobile phones, social networking, online reputation/digital footprints, online money scams, password security, wireless technology, mobile photography/video equipment, smartwatches etc

Mobile phones/smartwatches:  Even though this is not a major issue at our school we maintain an awareness of the development of the mobile phone/smartwatch use, i.e. texting, photography/video with high quality digital camera’s, internet use, bluetooth connectivity etc. The pupils are not allowed to bring their own mobile phone/smartwatch into school for Safeguarding reasons. Any pupil inadvertently bringing a phone/smartwatch into school has to leave it in the main office for the day. They are actively discouraged from bringing a mobile phone/smartwatch into school. If a pupil is found to have a mobile phone/smartwatch on their person this will be taken to the office and parents will be informed. Staff wanting to use mobile phones/smartwatches are to do this at break times or after school, in areas away from pupils. They must not take photographs of anything that would breach contract including pupils.

Social networking: Sites are filtered out by the local authority. Should a pupil report issues regarding social media this will be recorded in the E-Safety book and passed to senior management. These issues will be a focus in half termly E-Safety sessions delivered to pupils who this is applicable to. If incidences are seen as a safeguarding issue, the appropriate safeguarding procedures will be followed.  The development of social networking sites has provided opportunities for pupils to perpetuate bullying and abuse of other pupils and staff. In addition there are increasing cases of child sexual exploitation and radicalisation reported on social networking sites. The Local Authority has a clear Social Networking Protocol, a copy of which is in each classroom.

Staff use of the School Computer equipment and Network

All teachers have school issued encrypted laptops. The school also has class sets of laptops for students use. There are some training laptops available for other interested staff. This section will include guidance on the correct use of this equipment.

The school laptops issued to different staff should be used only for work related to school. RM will install software when requested. The laptops will have virus software installed. This should be checked for regular updates by RM. Staff will be able to connect to the school network but if there is any doubt about virus infection they should have the laptops checked by RM. The security of the laptop is the responsibility of each staff; laptops should not be left in cars and in any area that could be vulnerable to theft. Laptops are insured through the school.

 Where encrypted USB pen drives and hard drives are provided they should be used with care. Sensitive information should not be stored on them permanently and they should only be used on school devices and not personal ones.

The school network can be accessed by staff or class accounts. Each class will have a user name and password. Staff can also login to the network using their school accounts if their profile has been organised by the technician. Staff are reminded that these individual passwords must be changed on at least a termly basis.  All computers are logged in to the network.  All staff will be responsible for pupils they are working with. If pupils are working semi independently on the computers they should be logged in via the class/pupil account. Supply staff will have access to class computers via the class account.

Digital Literacy: Staff adhere to copyright laws, for example ensure that any image/music/video file downloaded from the internet is copyright free. Staff are aware of the creative commons website.

E-Safety and Forensic software

Forensic software is installed on all computers and laptops at our school.  It will monitor the internet use of all computers and laptops.  The use of this software will provide extra security of our internet use.

ESafe Global provides constant monitoring of all school computers.  In the case of an e-safety incident, a report is sent to the Head Teacher.

General E- Safety   issues and information

Information on updates and from courses/ meetings will be shared in staff meetings/behaviourwatch or on inset days. The E-Safety lead conducts an annual staff meeting surrounding this. This is an opportunity to share current trends and to allow for a staff discussion.

Visitors to Kemball will be issued with an e-safety card upon signing in

Procedures for Handling e-safety complaints

  • E-Safety incidents from pupils will be recorded in the log book in the office.
  • Complaints of internet misuse will be dealt with by a senior member of staff.
  • Any complaint about misuse by staff must be referred to the Head Teacher.
  • Complaints of a child protection nature must be dealt with in accordance with the school’s Safeguarding Children procedures.
  • The website   www.ceop.gov.uk   (Child exploitation and online protection) is a very helpful website for information for parents, young people and teachers.


All staff receive regular e-safety briefings.   They outline what current trends are as far as online dangers. Staff are constantly monitoring this. All e-safety issues are recorded in a book located in the school office. Minor e-safety issues will be dealt with in class by classroom staff. Where there is a feeling that they are more serious in nature or may become so senior leadership will be notified. All Safeguarding issues will immediately be passed to the senior leadership team.

Staff are aware of and are expected to adhere to the mobile phone policy, staff information systems code of conduct and social networking protocol. Staff have signed to agree to follow these documents. They are aware that should they be in breach of these documents, where necessary the relative authorities will be informed.

This policy has been written by Kathy Walsh (Computing coordinator) and Lisa Hughes (Head Teacher)

This will be reviewed regularly in relation to the developments in technology and / or policy Separate documents