POLICY FOR

CYBERBULLYING

To be read in conjuction with the e-safety policies

REVIEWED: February 2017

SIGNED W. Gibson (Chair)

CYBERBULLYING

WHAT IS CYBERBULLYING? Technology allows the user to bully anonymously or from an unknown location, 24 hours a day, 7 days a week. Cyber-bullying leaves no physical scars so it is, perhaps, less evident to a parent or teacher, but it is highly intrusive and the hurt it causes can be very severe.

There are many types of cyber-bullying including:

▪ Text messages —that are threatening or cause discomfort - also included here is "Bluejacking" (the sending of anonymous text messages over short distances using "Bluetooth" wireless technology) ▪ Mobile phone calls — silent calls or abusive messages; or stealing the victim’s phone and using it to harass others, to make them believe the victim is responsible. ▪ Emails — threatening or bullying emails, often sent using a pseudonym or somebody else’s name. ▪ Instant messaging (IM) — unpleasant messages sent while children conduct real-time conversations online using Facebook, Skype or other instant messaging mediums. ▪ Snap Chat – unpleasant videos and pictures sent which self-destruct after a few seconds of a person viewing them. ▪ Photo/ Video Sharing - unpleasant photos/vidoes can be sent to children either publicly or privately on Instagram, as well as through a variety of other social networking platforms, such as Facebook, Twitter, Tumblr, and Flickr. ▪ Bullying via websites — use of defamatory blogs (web logs), personal websites and online personal “own web space” sites such as Bebo, Twitter, Myspace and Facebook, (which works by signing on in one’s school, therefore making it easy to find a victim)– although there are others. ▪ Sexting - Images or videos generated by children under the age of 18, or of children under the age of 18 that are of a sexual nature or are indecent.

CYBERBULLYING AND THE LAW Bullying is never acceptable. Although bullying is not a specific criminal offence in UK law, criminal and civil laws can apply in terms of, for example, harassment or threatening behaviour, and particularly relevant for cyberbullying – threatening and menacing communications.

PREVENTING CYBERBULLYING At Park School pupils are taught how to use new technologies safely through discreet computing lessons, Kidsafe sessions, in circle time and SMSC topics. The children are taught: ▪ how to use technology appropriately;

▪ the risks and consequences of misusing technology by referring to the Think U Know Website; ▪ what to do if they or someone they know is being cyber bullied; ▪ how to stay safe, during Kidsafe sessions, which includes cyberbullying. They are trained to Say No, Walk Away or Tell a Trusted Grown Up.

Pupils are trained to report any problems connected with cyber bullying. If they do have a problem, they can talk to the school, their parents or the police. They are taught to: ▪ not delete any offensive messages, texts and e-mails; ▪ never reply or respond to any abusive calls, messages, texts and e- mails;

UNDERSTANDING AND TALKING AND ABOUT CYBERBULLYING Young people are particularly adept at adapting to new technology, an area that can seem a closed world to adults. As a result the school informs parents about e-safety at the beginning of each year in class induction meetings and directs them to the Think U Know website.

UPDATING EXISTING POLICIES AND PRACTICES Other policies relating to pupil welfare and ICT will be updated regularly and shared with pupils and parents. Records of any cyber bullying will be reported to the head teacher as a safe guarding concern, and pupils are made aware that searches can be made of past internet use.

PROMOTING THE POSITIVE USE OF TECHNOLOGY The school uses technology successfully to promote and personalise learning. Staff model and inform pupils about safe ways to use technology. When appropriate, specific workshops with outside agencies will be provided to raise the profile of e-safety. This has included KCP e-safety training, Kidsafe training in relation to safeguarding and staff meetings related to cyberbullying.

EVALUATING THE IMPACT OF PREVENTION ACTIVITIES Anti-bullying policies are reviewed annually. Surveys of parents and pupils measure the extent of the school’s success in promoting and maintaining pupil well-being. RESPONDING TO CYBERBULLYING Re-assurance will be given that the child has done the right thing by telling someone and the incident will be reported to parents (where this does not pose safeguarding risks to the child).

Advice will be given about the next steps: • Make sure that the child knows not to retaliate or return the message. • Ask the child to think about what information they have in the public domain. • Help the child to keep relevant evidence for any investigation. • Check the child understands how to prevent it from happening again e.g. by changing contact details, blocking contacts or leaving a chatroom.

Take action to contain the incident when content has been circulated: • If you know who the child is, ask them to remove the content. • Contact the host to make a report to get the content taken down. • In the cases of illegal content, contact the police, who can determine what needs to be kept for evidential purposes.

INVESTIGATING INCIDENTS All bullying incidents are recorded and investigated. Staff and parents are advised to make records as these can act as evidence. Steps will be taken to identify the bully, which may involve interviewing witnesses, contacting the service provider and the police if necessary so that the data of other users can be accessed.

WORKING WITH THE BULLY AND SANCTIONS Once the person bullying is identified, steps will be taken to address their attitude and behaviour as well as ensuring access to any support that is required. Factors which will be considered when determining sanctions include: • The impact on the victim: was the bully acting anonymously, was the material widely circulated and humiliating? • The motivation of the bully: was the incident unintentional or retaliation to bullying behaviour from others.

SIGNED:

DATE: February 2017