SlideShare a Scribd company logo
1 of 26
Download to read offline
E-safety
Overview
James Grew
Sales Director
Classroom Control, E-safety and Network Management software that
enables:
What is Impero?
• Teachers to teach (without being IT experts)
• Network Managers to manage and protect their network
• SLT to enforce AUP’s and identify children that may be at risk from harm
• Students to make safe, responsible choices when using ICT and stay on task
What is Impero?
Teachers to:
• Manage pupil behaviour in
relation to the use of ICT and the
internet in school
• Identify and safeguard a child
that may be at risk of harm
• Use ICT in a fun and engaging
way to enhance lessons
• Take a managed rather than a
locked down approach to e-safety
and web filtering
Network managers to control and
manage:
• Devices on their network
• Print
• Power usage
• Licensing
• Patch management
• Firewalls
• Block websites, applications,
windows, USB sticks
Network, E-safety and Classroom Management software that enables:
How Impero Ed Pro enables a school to take a managed approach to e-safety in line with
Ofsted Best practise
Key word detection policies
• Sexting
• Grooming
• Suicide
• Self-harm
• Adult Content
• Others in pipeline
e.g. radicalisation & terrorism,
weapons & violence, illegal
content, gambling, drugs,
hacking, general swearing.
• Eating Disorders
• Bullying & Trolling
• Racist language
• Homophobic language
9 key word detection policies with term definitions
E-safety detection policies – quick sample
Keyword
• FOAD
• FUGLY
• Bio-oil
• An hero
• Thigh gap
• Pic 4 Pic
• Womb raider
Definition
• Text speak for: F*** off and die
(A phrase that may be used to upset someone or encourage them to commit suicide)
• Text speak for: F****ing ugly
(A phrase that may be used to upset someone or to make them feel worthless)
• A stretch mark oil
(that is often used by self harmers to minimise appearance of scars)
• A dead hero (term used for getting kudos by committing suicide)
• A space between the top part of a persons legs
(An aspirational body image often sort after by people with eating disorders)
• Text speak for: Picture for picture
(A potential indicator of a user sharing naked images of themselves online)
• Derogatory slang term for: A homosexual female
Screen shots
of Console
Acceptable Use policy
Live thumbnail view
Computer List view
Log Viewer
Screen shot evidence
Confide tool
• Confidential reporting service
• allows users to send notifications, anonymously if they
wish, of any concerns that they may have about
themselves or any other person.
• Ofsted requirement for anonymous online reporting
mechanism
Confide tool
Confide viewer
General e-safety - 7 Key strengths over other e-safety
monitoring solutions
Feature Benefit
1. Classroom control and e-safety
monitoring in one system
In line with Ofsted best practise, allows a
school to take a managed, rather than a
locked down approach, to e-safety –
shared amongst all staff as part of their
general behaviour management processes
2. Granularity of control over keyword
detection policies e.g. keyboard, URLs,
HTML etc.
Allows greater control over managing
false positives compared to other leading
monitoring systems
3. Key word definitions /explanations Glossary helps teachers to make an
appropriate judgement call as this feature
helps educate them about a potential
incident as it explains text speak/slang
terms and puts these into a context
around how it might be used
General e-safety - 7 Key strengths over other e-
safety monitoring solutions
Feature Benefit
4. Video capture for violations Helps provide further context around a
violation capture ( new policies set to
video record on severe violations).
5. Confide tool with log to record and
manage incidents
Puts a direct tick in the box with Ofsted as
enables students to report incidents
anonymously to named contacts within
the school and review logs of these
incidents – only monitoring and
classroom control product to have this
facility integrated into it.
6. Auto sanction setting Allows automatic sanctions to be set in
relation to the detection of a keyword e.g.
ban internet for x minutes.
General e-safety - 7 Key strengths over other e-
safety monitoring solutions
Feature Benefit
7. Keyword detection policies developed
in conjunction with key national
organisations and school pupils.
Ensures specialist knowledge and that
policies are kept up to date and contain
the relevant slang/text speak terms being
used in schools
Ofsted inspecting e-safety
School-based reporting routes
that are clearly understood
and used by the whole school,
for example online
anonymous reporting systems.
Samples of
Violation
Screenshots
Thank you
Any Questions?
sgriffiths@imperosoftware.com
Associate members of:
Working partnerships with:

More Related Content

Viewers also liked

Diploma Of Business Cert
Diploma Of Business CertDiploma Of Business Cert
Diploma Of Business CertLaurel Ellwood
 
Environmental_Certificate_Nelly
Environmental_Certificate_NellyEnvironmental_Certificate_Nelly
Environmental_Certificate_NellyNelly Alavi Espejo
 
Cert IV in Occupational Health & Safety
Cert IV in Occupational Health & SafetyCert IV in Occupational Health & Safety
Cert IV in Occupational Health & SafetyMark Gregory
 
Cabin Crew Diploma CERT
Cabin Crew Diploma CERTCabin Crew Diploma CERT
Cabin Crew Diploma CERTPaul Hulse
 
Steve Ng - Advance Cert in Workplace Safety
Steve Ng - Advance Cert in Workplace SafetySteve Ng - Advance Cert in Workplace Safety
Steve Ng - Advance Cert in Workplace SafetySTEVE NG SHI XI
 
Scaffold Safety & Inspection cert
Scaffold Safety & Inspection certScaffold Safety & Inspection cert
Scaffold Safety & Inspection certMike Webb
 
General_Health_Safety_and_Environmental_Awareness_certificate_of_completion
General_Health_Safety_and_Environmental_Awareness_certificate_of_completionGeneral_Health_Safety_and_Environmental_Awareness_certificate_of_completion
General_Health_Safety_and_Environmental_Awareness_certificate_of_completionsamuel muhlenburg
 
Purcell, Catherine - Cert IV Work, Health & Safety
Purcell, Catherine - Cert IV Work, Health & SafetyPurcell, Catherine - Cert IV Work, Health & Safety
Purcell, Catherine - Cert IV Work, Health & SafetyCatherine Purcell
 
Cert of Safety Achievement
Cert of Safety AchievementCert of Safety Achievement
Cert of Safety AchievementDariusz Matynia
 
Logistical Support to United Nations Peacekeeping Operations: An Introduction
Logistical Support to United Nations Peacekeeping Operations: An IntroductionLogistical Support to United Nations Peacekeeping Operations: An Introduction
Logistical Support to United Nations Peacekeeping Operations: An IntroductionJavier I. Hoyos
 
PMI Membership Cert
PMI Membership CertPMI Membership Cert
PMI Membership CertMarlon Daley
 

Viewers also liked (20)

Diploma Of Business Cert
Diploma Of Business CertDiploma Of Business Cert
Diploma Of Business Cert
 
Environmental_Certificate_Nelly
Environmental_Certificate_NellyEnvironmental_Certificate_Nelly
Environmental_Certificate_Nelly
 
BOSIET OPITO Cert
BOSIET OPITO CertBOSIET OPITO Cert
BOSIET OPITO Cert
 
Certificate of Training
Certificate of TrainingCertificate of Training
Certificate of Training
 
Cert IV in Occupational Health & Safety
Cert IV in Occupational Health & SafetyCert IV in Occupational Health & Safety
Cert IV in Occupational Health & Safety
 
Cabin Crew Diploma CERT
Cabin Crew Diploma CERTCabin Crew Diploma CERT
Cabin Crew Diploma CERT
 
Steve Ng - Advance Cert in Workplace Safety
Steve Ng - Advance Cert in Workplace SafetySteve Ng - Advance Cert in Workplace Safety
Steve Ng - Advance Cert in Workplace Safety
 
Scaffold Safety & Inspection cert
Scaffold Safety & Inspection certScaffold Safety & Inspection cert
Scaffold Safety & Inspection cert
 
Gondola Safety Training cert
Gondola Safety Training certGondola Safety Training cert
Gondola Safety Training cert
 
CPHQ Review Course
CPHQ Review CourseCPHQ Review Course
CPHQ Review Course
 
ucs cisco training cert
ucs cisco training certucs cisco training cert
ucs cisco training cert
 
General_Health_Safety_and_Environmental_Awareness_certificate_of_completion
General_Health_Safety_and_Environmental_Awareness_certificate_of_completionGeneral_Health_Safety_and_Environmental_Awareness_certificate_of_completion
General_Health_Safety_and_Environmental_Awareness_certificate_of_completion
 
Purcell, Catherine - Cert IV Work, Health & Safety
Purcell, Catherine - Cert IV Work, Health & SafetyPurcell, Catherine - Cert IV Work, Health & Safety
Purcell, Catherine - Cert IV Work, Health & Safety
 
Cert of Safety Achievement
Cert of Safety AchievementCert of Safety Achievement
Cert of Safety Achievement
 
UoP MSc CERT
UoP MSc CERTUoP MSc CERT
UoP MSc CERT
 
Masters Cert (UEL)
Masters Cert (UEL)Masters Cert (UEL)
Masters Cert (UEL)
 
Food Safety Level 4
Food Safety Level 4Food Safety Level 4
Food Safety Level 4
 
Logistical Support to United Nations Peacekeeping Operations: An Introduction
Logistical Support to United Nations Peacekeeping Operations: An IntroductionLogistical Support to United Nations Peacekeeping Operations: An Introduction
Logistical Support to United Nations Peacekeeping Operations: An Introduction
 
Intl. Diploma Cert.
Intl. Diploma Cert.Intl. Diploma Cert.
Intl. Diploma Cert.
 
PMI Membership Cert
PMI Membership CertPMI Membership Cert
PMI Membership Cert
 

Similar to E-safety Impero slides Mar2015

Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationGreg Friese
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
NAEMSE Webinar: Integrating Smartphones into EMS Education
NAEMSE Webinar: Integrating Smartphones into EMS Education NAEMSE Webinar: Integrating Smartphones into EMS Education
NAEMSE Webinar: Integrating Smartphones into EMS Education Greg Friese
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGHuman Capital Media
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education Greg Friese
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Test Security
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxannettsparrow
 
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...Jason Rhode
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 

Similar to E-safety Impero slides Mar2015 (20)

Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
NAEMSE Webinar: Integrating Smartphones into EMS Education
NAEMSE Webinar: Integrating Smartphones into EMS Education NAEMSE Webinar: Integrating Smartphones into EMS Education
NAEMSE Webinar: Integrating Smartphones into EMS Education
 
Chapter 7 the good-enough - tables
Chapter 7   the good-enough - tablesChapter 7   the good-enough - tables
Chapter 7 the good-enough - tables
 
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNINGEMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
EMBRACING DISRUPTION: HOW ONE MULTINATIONAL IS CHANGING ITS APPROACH TO LEARNING
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education
 
Tables
TablesTables
Tables
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online Proctoring
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...
Approaching the Bleeding Edge: Possibilities & Practices for Learning Technol...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 

E-safety Impero slides Mar2015

  • 2. Classroom Control, E-safety and Network Management software that enables: What is Impero? • Teachers to teach (without being IT experts) • Network Managers to manage and protect their network • SLT to enforce AUP’s and identify children that may be at risk from harm • Students to make safe, responsible choices when using ICT and stay on task
  • 3. What is Impero? Teachers to: • Manage pupil behaviour in relation to the use of ICT and the internet in school • Identify and safeguard a child that may be at risk of harm • Use ICT in a fun and engaging way to enhance lessons • Take a managed rather than a locked down approach to e-safety and web filtering Network managers to control and manage: • Devices on their network • Print • Power usage • Licensing • Patch management • Firewalls • Block websites, applications, windows, USB sticks Network, E-safety and Classroom Management software that enables:
  • 4. How Impero Ed Pro enables a school to take a managed approach to e-safety in line with Ofsted Best practise
  • 5. Key word detection policies • Sexting • Grooming • Suicide • Self-harm • Adult Content • Others in pipeline e.g. radicalisation & terrorism, weapons & violence, illegal content, gambling, drugs, hacking, general swearing. • Eating Disorders • Bullying & Trolling • Racist language • Homophobic language 9 key word detection policies with term definitions
  • 6. E-safety detection policies – quick sample Keyword • FOAD • FUGLY • Bio-oil • An hero • Thigh gap • Pic 4 Pic • Womb raider Definition • Text speak for: F*** off and die (A phrase that may be used to upset someone or encourage them to commit suicide) • Text speak for: F****ing ugly (A phrase that may be used to upset someone or to make them feel worthless) • A stretch mark oil (that is often used by self harmers to minimise appearance of scars) • A dead hero (term used for getting kudos by committing suicide) • A space between the top part of a persons legs (An aspirational body image often sort after by people with eating disorders) • Text speak for: Picture for picture (A potential indicator of a user sharing naked images of themselves online) • Derogatory slang term for: A homosexual female
  • 13. Confide tool • Confidential reporting service • allows users to send notifications, anonymously if they wish, of any concerns that they may have about themselves or any other person. • Ofsted requirement for anonymous online reporting mechanism
  • 16. General e-safety - 7 Key strengths over other e-safety monitoring solutions Feature Benefit 1. Classroom control and e-safety monitoring in one system In line with Ofsted best practise, allows a school to take a managed, rather than a locked down approach, to e-safety – shared amongst all staff as part of their general behaviour management processes 2. Granularity of control over keyword detection policies e.g. keyboard, URLs, HTML etc. Allows greater control over managing false positives compared to other leading monitoring systems 3. Key word definitions /explanations Glossary helps teachers to make an appropriate judgement call as this feature helps educate them about a potential incident as it explains text speak/slang terms and puts these into a context around how it might be used
  • 17. General e-safety - 7 Key strengths over other e- safety monitoring solutions Feature Benefit 4. Video capture for violations Helps provide further context around a violation capture ( new policies set to video record on severe violations). 5. Confide tool with log to record and manage incidents Puts a direct tick in the box with Ofsted as enables students to report incidents anonymously to named contacts within the school and review logs of these incidents – only monitoring and classroom control product to have this facility integrated into it. 6. Auto sanction setting Allows automatic sanctions to be set in relation to the detection of a keyword e.g. ban internet for x minutes.
  • 18. General e-safety - 7 Key strengths over other e- safety monitoring solutions Feature Benefit 7. Keyword detection policies developed in conjunction with key national organisations and school pupils. Ensures specialist knowledge and that policies are kept up to date and contain the relevant slang/text speak terms being used in schools
  • 19. Ofsted inspecting e-safety School-based reporting routes that are clearly understood and used by the whole school, for example online anonymous reporting systems.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.

Editor's Notes

  1. Students actually quickly learn to like us as they actually have more freedom moving forward as schools are more confident of opening up access to Social networking sites, You tube etc - a freedom, but with responsibility’ approach. If they are doing nothing untoward they have nothing to fear and teachers can use, and allow students to use more engaging resources that are out there!
  2. Increase teaching time spent on the key learning objectives within a lesson by breaking down the barriers of using technology in class Save money as world class e-safety monitoring & classroom control software integrated in one package Empower your teachers to deliver engaging lessons using ICT by giving them the tools to monitor, control, & manage internet and ICT use, ensuring minimum distractions & maximum learning
  3. Something to potentially talk about with E-safety officers, CPLO/s, head teachers etc. It all informs good practise and good assessment.
  4. Policies set to detect only, can be set to block etc or even set to trigger another action e.g. send email alert, ban internet for x minutes etc. School can edit and amend easily to suit needs. Set to detect if typed, can be programmed to detect in html code, urls. Application windows., emails etc Possible to duplicate policies so you can set up higher levels of detection, or bespoke settings for your most vulnerable students. Will increase false positives but only for circa 10 students rather than the whole school
  5. Glossary definitions to help understand text speak and why some terms are detected. Only product on market that has the definitions to accompany terms so helps educate teachers to know what is going on and make a judgement call on the level of action required.
  6. Screen shot of server where you can set up different policies for different groups and apply different settings e.g. Display AUP when users log in Can log acceptance of AUP Can log users off if do not agree to AUP Text, font colour and image can be added to AUP to customise to audience/school
  7. Teacher console - Teacher can see all screens of students in their lesson in real time. And remote into the students computers if required to offer assistance Acts as a deterrent as gets students thinking about and modifying their behaviour. Most students are at risk because they either don’t know, don’t care, or don’t think. Just knowing they are being monitored in realtime can make them think and modify their behaviour.
  8. Teacher console: Teachers can manage and view incidents as they arise in their actual lesson - screenshot evidence, just for their lesson. Matches with Ofsted’s recommended whole school approach for e-safety as empowers class teachers to deal with incidents as part of their general behaviour management strategies. Key SLT e.g. head of pastoral care, DSL, LADO etc. can still look at log viewer to view any incidents that need escalating, managing etc.
  9. Console; Log viewer Who, were, when data – can be used to look for evidence and also for involving specialists e.g. CPO’s, anti-bullying officer, pastoral care staff etc. Can set up email alerts for certain violations to be sent to certain staff members etc. SLT can look at trends over time, and start using data to manage/change policies going forward. Good evidence for Ofsted as all incident notes can be logged in system.
  10. Example if a screen shot Who, where , when, what data – a picture paints a thousand words Evidence that can be shared with pupil, other staff, parents/carers etc. Print, export to Pdf. Really powerful with parents as a picture paints a thousand words – moves conversation on from proving a pupil has done something to discussions around behaviour and what to do moving forward.
  11. Confide button that sits on desktop and/or login screen for students to click on to report a concern Direct tick in the box with Ofsted Inspection judgements criteria.
  12. Windows that students will see when clicked on Confide button. All text fully customisable and logo etc can be added to welcome page Can include photos/ images of relevant members of staff.
  13. Confide Viewer log in teacher console. Manage incidents from within the Confide Viewer. Audit trail of actions etc. Categorise types of incidents e.g. homophobic bullying, physical bullying etc. History can not be edited or deleted – so full audit trail. Stops a teacher getting rid of an allegation about them.
  14. Unique features for impero
  15. First came out Sept 2012, constantly being revised Impero helps schools take a whole school and managed approach to e-safety. It also provides an electronic online reporting mechanism, one of the features listed as being seen in good or outstanding schools in Ofsteds e-safety briefing for inspectors.
  16. These are real incidents that have been captured in schools ( identifying data has been removed to protect the school, and its pupils who kindly gave us permission to share these examples).
  17. Secondary example
  18. Secondary school example
  19. Secondary example
  20. Primary school example