Author: George Milliken

microsoft teacher toolkit

Microsoft Teacher Toolkit – introduction to Microsoft OneDrive and Teams in Glow

Learn the essential skills and knowledge to use Microsoft OneDrive and Teams. These step-by-step training courses are aimed at teachers who are new or lack confidence in using Microsoft 365 in Glow.

The skills and knowledge are based on the Essential Teacher Digital Skills.

Sign up using the events links below:
COMING SOON

 

back to Teacher Digital Skills

Digital Teacher diagram (landscape)

Attendees are REQUIRED to be able to join in with the tutorial activities using their Glow account.

This session will explain how to:

  • login to Glow and find Teams and OneDrive apps
  • use OneDrive to create, store and share files
  • create and join classes on Teams

View the step-by-step video tutorials for each skill on the Essential Teacher Digital Skills page

Book CLPL webinars

Loading… Loading…

google teacher toolkit

Google Teacher Toolkit – introduction to Google Drive and Classroom in Glow

Learn the essential skills and knowledge to use Google Drive and Classroom in Glow. These step-by-step training courses are aimed at teachers who are new or lack confidence in using Google Workspace in Glow.

The skills and knowledge are based on the Essential Teacher Digital Skills.

Sign up using the events links below:
COMING SOON

 

back to Teacher Digital Skills

Digital Teacher diagram (landscape)

Attendees are REQUIRED to be able to join in with the tutorial activities using their Glow account.

This session will explain how to:

  • login to Glow and find Classroom and Drive apps
  • use Drive to create, store and share files
  • create and join classes on Classroom

View the step-by-step video tutorials for each skill on the Essential Teacher Digital Skills page

Book CLPL webinars

Loading… Loading…

this is digital term4 clpl

30 May, This is Digital Learning and Teaching professional learning programme

As educators it is our responsibility to make effective use of digital technology to deliver high quality teaching, engaging learning and effective assessment.

This four-part professional learning programme is designed to enhance educators’ knowledge and skills in order to develop their planning, teaching and learning, and assessment and feedback with digital technology.

 

The four sessions cover:

  • preparing for digital in the classroom
  • creating quality resources for learning
  • creative approaches to teaching with digital
  • effective assessment and feedback approaches with digital

 

Find out more about the programme with this link.

Sign up for this programme using this link: EventBrite signup page here

cyber toolkit unwanted contact

Communicate: unwanted contact

Unwelcome friend/follow requests or messages (20%) and unwanted sexual messages (8%) account for 28% of the potential risks encountered by UK internet users aged 13+ (Ofcom, 2022). Understanding how the platform works can help children and young people reduce the likelihood of this potential risk by managing who can and cannot contact them.

 

back to Communicate

cyber toolkit communicate

Internet safety risks and considerations

Access

In order to communicate with others online, learners usually need access to:

  • an internet-enabled device
  • apps to communicate – this may include the device’s own messaging, calls or video calls (FaceTime) apps, as well as the most common additional messaging apps WhatsApp and Snapchat
  • someone else to communicate with

When supporting learners with this area, it is important to consider who controls their access to these opportunities and resources:

  • Is there a risk of this occurring in school?
  • How is that enabled?
  • Are there steps that could be taken to reduce the risk of this?

If it is an out-of-school risk:

  • How can the school support with this?
  • Is support required for families or learners?
  • Who can support with this: Community Learning and Development or Police Scotland?
Potential risks

Being more cyber resilient reduces the risk of internet safety issues arising. We all want the internet to be a more welcoming space for children and young people and that is why we promote this positive message of safe, smart and kind.

Topics to explore with learners might include are:

  • the people they communicate with – groups or individually
  • the platforms they communicate on – impact of device or context
  • types of content they might share – risk of inappropriate content
  • the risks of sharing created content
  • the law about online communications – Communications Act 2003
  • the potential risks, and associated harms, the same for everyone – why are they different, and why does this matter?

Cyber resilience guidance

Devices

The first potential vulnerability when communicating online is the device not being securely setup.

Check with learners that they have taken these steps to reduce the risk of someone accessing and communicating with their device without permission:

  • a screenlock that requires a passcode or biometric (face or fingerprint) to log in to stop unauthorised access (hacking)
  • apple devices have a content filter, called communication safety in Messages, in their ‘screen time’ settings that blocks potentially nude content from children’s phones
Accounts

Another potential vulnerability when communicating online is that accounts on the device or online platform not being secure enough and allowing others to use their device or contact them.

Check with learners that they have taken these steps on their apps to reduce the risk unwanted contact:

  • they use device or platform security features, inlcuding password, biometrics or 2FA to ensure only they can access it
  • they know how to use the settings and security features to set the platform up to only share information they are willing to share – this can reduce their ‘visibility’ and potentially reduce the chances of unwanted contact
  • they can use the settings and security settings to control who is able to contact them, see/reply to their posts or direct message them on the platform

 

Whatsapp 
Safety and security features

How to block and report contacts

How to change group privacy settings

How to change your privacy settings

Snapchat

How To Report A Snap

Snapchat Reporting Quick Guide

Reporting on Snapchat – Safety Snapshot video

How do I change my privacy settings on Snapchat?

How to Remove a Friend

FaceTime

Block unwanted callers in FaceTime on iPhone

Report and support

When using devices or online platforms to create communicate, learners should understand that online platforms and services, including apps, carry greater risk of being shared without permission as the messages and content on these is almost always stored on their server, which is the company’s computer, and not the child or young person’s device. 

Should created content ever be shared with, or without, permission then learners should have the knowledge, skills and support to report and recover from the potential risks associated with this:

ANY communication that contains content that depicts child sexual abuse MUST be reported to the police or CEOP

Whatsapp 
How to block and report contacts

Snapchat

How To Report A Snap
Snapchat Reporting Quick Guide

Reporting on Snapchat – Safety Snapshot video

FaceTime

Block unwanted callers in FaceTime on iPhone

Adults can report concerns about unwanted contact to NSPCC

Children and young people can report concerns about unwanted contact to Childline

cyber toolkit: consume

Cyber Toolkit: Consume

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using online platforms to consume content. Content that is consumed is created by others and shared online by individuals or organisations and can be any form of media, including video, photos, text or games. 

Cyber Toolkit home

Go to Create or Communicate

cyber toolkit: consume

A lot of our online time is spent consuming others’ content, such as reading news or social media posts, watching videos or playing games. The main potential risks of this content are:

Misinformation

cyber toolkit informaiton literacy and misinformation

Misinformation, sometimes called ‘fake news’, is content created to deliberately mislead or misinform audiences and the single biggest risk to UK internet users (22% of UK users encountering potential harms, Ofcom 2022). This may be done to further a cause or goal, such as in politics, or to cause harm or alarm, such as scaring people off medicines and vaccines.

view the Information Literacy page

Inappropriate content

cyber toolkit inappropriate content

Inappropriate content is any form of media that may be harmful to the person consuming it and is the biggest combined threat to UK  internet users (40%* of UK users encountering potential harms, Ofcom 2022). What is considered inappropriate differs between the people viewing it. Some content may be deemed inappropriate for the age of the person consuming it, such as swearing, or more generally harmful, such as racist language or imagery.

view the Inappropriate Content page

Spending money online

cyber toolkit spending money online

More of our money is spent online than ever before, however, this can be problematic when money is being scammed or stolen, or the individual loses control of their spending, such as with problematic gambling. Scams, fraud and phishing are the most commonly experienced potential financial harms, encountered by 27% of UK online users (Ofcom, 2022)

Fast Forward is the gambling support charity for Scotland and have in-depth guides and advice on gambling support – go to Fast Forward page.

view the Spending Money Online page

cyber toolkit

Cyber Toolkit for Teachers

The Cyber Toolkit is designed to help teachers find the most appropriate and useful advice, information and resources to support learners to learn how to go be safer and more secure online.

  go to cyber home

When we use the internet we either consume, create or communicate. Each of these behaviours has different levels and types of risk. This toolkit will help you to diagnose, understand and then support learners with their digital needs. 

Before you start with the toolkit, find out what your learners are using and doing online; and the issues or risks this presents. With this information you can use the toolkit to locate information, resources and professional learning to support you in planning meaningful CRIS learning.

Use the menu below to select the area of learning you need:

Upcoming Cyber Toolkit CLPL

- The Cyber Toolkit is designed to help teachers find the most appropriate and useful advice, information and resources to support learners.   When we use the internet we either consume, create or communicate. Each of…
cyber toolkit 04 may - The Cyber Toolkit is designed to help teachers find the most appropriate and useful advice, information and resources to support learners. When we use the internet we either consume, create or communicate. Each of these…

Understanding Cyber Resilience textbook

A short text that covers some of the key vocabulary for cyber resilience; explaining it and with an activity for learners to demonstrate their knowledge or understanding of it.

 

view the book in new tab

Understanding ’consume create communicate’

Sort the online activity post-its into consume, create or communicate and check your understanding.

cyber toolkit create

Cyber Toolkit: Create (NEW)

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using devices and online platforms to create content. This can be any form of media, including video, photos, text or games. Creating content carries less risk than consuming or communicating as long as the content remains on the device – the biggest risks coming when created content is shared via communication.

Ofcom data (2022) shows that the number of children and young people creating online video content is actually a small number and decreasing as this content becomes ‘more professionalised’.

Cyber Toolkit home

Go to Consume or Communicate

cyber toolkit create

Internet safety risks and considerations

Access

In order to create online content and potentially inappropriate or harmful content, learners usually need access to:

  • a device (internet access is not necessarily required for creating media content)
  • apps to create the content, such as the device’s camera and editing or manipulation apps

When supporting learners with this area, it is important to consider who controls their access to these opportunities and resources:

  • Is there a risk of this occurring in school?
  • How is that enabled?
  • Are there steps that could be taken to reduce the risk of this?

If it is an out-of-school risk:

  • How can the school support with this?
  • Is support required for families or learners?
  • Who can support with this: Community Learning and Development or Police Scotland?
Potential risks

Being more cyber resilient reduces the risk of internet safety issues arising. We all want the internet to be a more welcoming space for children and young people and that is why we promote this positive message of safe, smart and kind.

Topics to explore with learners might include are:

  • the types of content they might create
  • the risk in creating or sharing?
  • the risk of creating and sharing content to them or might it harm others?
  • the potential risks, and associated harms, the same for everyone – why are they different, and why does this matter?

Cyber resilience guidance

Devices

The first potential vulnerability when creating content is the device not being securely setup.

Check with learners that they have taken these steps to reduce the risk of content being stolen from their device:

  • their device account (Windows, iOS or android) has a strong password (three random words)
  • makes use of 2-factor authentication (2FA)
  • additional security features, such as fingerprints or facial recognition
  • has a unique account for each user (if shared device, such as a tablet or laptop)
  • a screenlock that requires a passcode or biometric (face or fingerprint) to log in to stop unauthorised access (hacking)
  • the latest operating system (usually iOS, android or Windows) installed as this usually fixes potential security vulnerabilities
  • installed apps from approved providers, such as App Store or Play Store to avoid potentially malicious apps that allow content to be stolen through a ‘backdoor’

 

Learners should also consider where created content is stored – this will typically be on the device but can also be stored on cloud storage, such as OneDrive, iCloud or Drive, and this adds the risk of remote hacking and content theft

 

  • apple devices have a content filter, called communication safety in Messages, in their ‘screen time’ settings that blocks potentially nude content sent or received on children’s phones
Accounts

Another potential vulnerability when creating content is the accounts on the device or online platform not being secure enough and allowing others to access created content.

Check with learners that they have taken these steps on their apps to reduce the risk of content being stolen from their accounts:

  • they use a secure, perhaps separate, email account (with its own unique username, secure password and 2FA)
  • they use their device security, such as account and biometrics, to log in to apps as this means they need to have the device in-hand to access the account
  • they do not share access to their account with anyone
  • they know how to use the settings and security features to set the platform up to only share information they are willing to share – this might include turning off data or location tracking, for example
Report and support

When using devices or online platforms to create content, learners should understand that online platforms and services, including apps, carry greater risk of being shared without permission as the content created on these is almost always stored on their server, which is the company’s computer, and not the child or young person’s device. 

Should created content ever be shared with, or without, permission then learners should have the knowledge, skills and support to report and recover from the potential risks associated with this:

Anyone under the age of 18 is considered a child by law and ANY content that contains exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

 

It is not illegal to film or photograph someone without consent, however, any exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

Digital content that may have been created consensually but once consent is revoked it can be challenging to stop the other party sharing it. The Internet Watch Foundation Report/Remove tool can be used to request any exploitative or indecent images and video are removed from online servers.

Resources

Thinkuknow by CEOP is the national website for learning about child exploitation and online protection (CEOP). Their learning resources site offers information and resoruces for learners, families and educators. 
These are a selection of the resources for different ages:

Jessie & Friends (4-7s)

Play Like Share (8-10)

Send me a pic? (11-14)

Exploited (14+)

cyber toolkit communicate

Cyber Toolkit: Communicate (NEW)

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using online platforms to communicate. 69% of children aged 3-15 used an online communications service for making voice/video calls or sending messages in 2022 (Ofcom).

The Cyber First Aid Box can be used by families to discuss and provide support to children and young people who may have encountered an online harm.

Cyber Toolkit home

Go to Consume or Create

cyber toolkit communicate

Although most of our time online is spent consuming content, such as viewing social media posts, watching videos or playing games, there is perhaps greater risk of harm from online communications. Whereas the user is mostly in control of content they consume, communicating with others involves others and therefore the additional risk of their behaviour impacting the user.

It is important that learners learn how to setup and maintain as much control of their devices and accounts to reduce the potential risk of harm. Teachers should make learnign specific to as many of the learners as possible, the statistics below should help shape some of your conversations with learners and help to identify the apps most common to children and young people.

 

Ofcom (2022) statistics reveal that:

  • 50% of 3-15-year-olds use WhatsApp (rising to 75% of 12-15s)
  • 30% of children aged 3-15 use Snapchat
  • 30% of children aged 3-15 use FaceTime
  • 22% of those aged 13+ who had received a recent unwelcome friend request, follow request, or message, received this via an instant messaging service
  • 9% of UK internet users aged 13+ who had experienced an online potential harm in the last four weeks, encountered their most recent potential harm on an instant messaging platform

The potential risks of online communication are most likely (Ofcom, 2022):

  • unwelcome friend/follow requests or messages
  • trolling
  • bullying, abusive behaviour or threats
  • unwanted sexual messages

Unwanted contact

cyber toolkit unwanted contact

Unwelcome friend/follow requests or messages (20%) and unwanted sexual messages (8%) account for 28% of the potential risks encountered by UK internet users aged 13+ (Ofcom, 2022). Understanding how the platform works can help children and young people reduce the likelihood of this potential risk by managing who can and cannot contact them.

go to Unwanted Contact page

Trolling, bullying and abusive behaviour
cyber toolkit trolling bullying abusive behaviour

Trolling (15%) and bullying, abusive behaviour or threats (8%) account for 23% of the potential risks encountered by UK internet users aged 13+ (Ofcom, 2022). Understanding how the platform works can help children and young people reduce the likelihood of this potential risk by managing whose messages and posts they see, and how to mute or block people who may be trolling, bullying or abusing them.

go to Trolling, Bullying and Abusive Behaviour page

Technology assisted harmful sexual behaviour (TAHSB)
technology assisted harmful sexual behaviour

Technology-assisted harmful sexual behaviour (TA-HSB) is when children and young people use the internet or other technology to engage in sexual activity that may be harmful to themselves and others. TA-HSB covers a range of behaviour including:

  • the developmentally inappropriate use of pornography
  • online sexual abuse
  • grooming
  • sexting

go to TAHSB page