Programme of work for Data Protection Survey Outline The aim of the survey is to focus on the Data Protection practices of the school, highlighting areas of good practice and making recommendations as to improvements. The survey will look at policies and practices, talk to representatives of the school and look at the physical attributes of Data Protection in the school. The school will receive a confidential report which will assess the school against aspects of the 360 degree safe award (See Appendix A) and the recommendations from the recent ICO report1. Aspects of the report will be used anonymously by eLIM to influence work with other schools. After the visit and report the school will be supported to improve its practice and procedures relating to any recommendations made. Arranging the visit On an invitation from the school, a date for the visit will be arranged. hours. The visit will be for 2 – 2½ Gathering of evidence A week before the visit an email will be sent confirming the visit, requesting access to policies relating to Data Protection. These policies could include (please note: no school will have all of these policies and some might be included in one document): Data Protection Policy Privacy Information Notice/Fair Processing Notice FoI Publication Scheme Records Management Policy Records Retention/Disposal Policy Information Security Policy Policy for dealing with requests for personal Information Policy for dealing with requests for general information e-safety Policy Acceptable User Policies Use of images Policy The adviser will also look at the Data Notification Register on the ICO site. The Visit The adviser will be asking for information as shown in the visit survey document2. Many of the questions are aspirational and not all of the questions will be suitable for all schools. Therefore positive answers to all of the questions are not required for the school to show excellent practice. The people who will be able to answer these questions could include: the Data controller for the school, the Headteacher, SMT in charge of IT, administrators, ICT technicians or support and teacher in charge of ICT. It is up to the school to decide who is available to answer the questions. At the end of the visit indications will be given as to the position of the school in relation to its Data Protection policies and practices. 1 http://www.ico.gov.uk/news/latest_news/2012/report-offers-school-data-protection-advice-17092012.aspx 2https://slp.somerset.org.uk/sites/edtech/Data%20Protection/Data%20Protection/ELIM%20DP%20survey%2 0form.pdf lead ▪ learn ▪ protect ▪ engage www.somersetelim.org Programme of work for Data Protection Survey The Report Within 5 working days a draft of a report will be produced and sent to the Headteacher and other nominated people which will outline: areas of good practice recommendations for improvements Levels relating to aspects in the 360 Degree Safe Tool Indications as to how and where further support can be obtained The school will be free to suggest changes to the draft report with the final report being produced within 5 working days of any change suggested by the school. The school will be able to use and share the report in any way they wish. lead ▪ learn ▪ protect ▪ engage www.somersetelim.org Programme of work for Data Protection Survey Appendix A - Aspects from 360 Degree Safe Policy and Leadership > Leadership > Policy scope Level 1: There is no e-safety policy. Level 2: The school is in the process of establishing an e-safety policy. Level 3: The e-safety policy is limited to the use of the ICT systems, equipment and software in school. Level 4: The e-safety policy covers the use of the ICT systems, equipment and software in school and also addresses issues related to the use of school related ICT out of school and the use of personal ICT equipment in school. It is comprehensive in that it includes sections on issues such as social networking, cyber-bullying, data protection, passwords, filtering, digital and video images and use of mobile and/or gaming devices. Award Level Level 5: The e-safety policy covers the use of the ICT systems, equipment and software in school and also addresses issues related to the use of school related ICT out of school and the use of personal ICT equipment in school. It is comprehensive in that it includes sections on issues such as social networking, cyber-bullying, data protection, passwords, filtering, digital and video images and use of mobile and/or gaming devices. The policy clearly states the school’s responsibility and commitment to take action over school related e-safety incidents that take place out of school. The e-safety policy is differentiated and age related, in that it recognises the needs of young people at different ages and stages within the school. Policy and Leadership > Leadership > Acceptable use policies Level 5: There are no Acceptable Use Policies/Agreements. Level 4: Acceptable Use Policies/Agreements are being developed. Level 3: Acceptable Use Policies/Agreements are in place for pupils/students and staff. Level 4: Acceptable Use Policies/Agreements are in place for, and are signed by pupils/students (as appropriate by age) and staff/adult volunteers. Parents receive and countersign copies of the Pupil/Student AUP. There are clear induction policies to ensure that young people and adults who are new to the school are informed of and required to sign AUPs. Pupils/students provide feedback in reviews of AUPs. Award Level Level 5: Acceptable Use Policies/Agreements, which are differentiated by age and stage, are in place for, and are signed (annually) by, pupils/students (as appropriate by age), staff/adult volunteers and community users. Parents receive and, annually, countersign copies of the Pupil/Student AUP. The clear induction policies ensure that young people and adults who are new to the school are informed of and required to sign AUPs. Pupils/students provide feedback in reviews of AUPs. All users have knowledge of the e-safety policy and AUPs and understand their responsibilities, as described in the policy. The school encourages acceptable use through positive "reciprocal" agreements or covenants. Policy and Leadership > Leadership > Digital and video images Level 5: There is no policy relating to the use and publication of digital and video images. Level 4: A policy relating to the use and publication of digital and video images is being developed. Level 3: The school has policies relating to the use and publication of digital and video images and this is referred to in AUPs. Level 2: The school has clearly understood and accepted policies and AUPs relating to the use and publication of digital and video images. Parental permission forms are included in the AUP for publication of images on the website and other publications. Similar permission is gained from older secondary age students, reflecting their personal rights. All members of the school, including staff are educated about the risks associated with the taking, use, sharing, publication and distribution of images (and in particular the risks attached to publishing their own images on the internet). Digital images are always stored securely and disposed of appropriately. Award Level Level 1: The school has clearly understood and accepted policies relating to the use and publication of digital and video images. Parental permission forms are included in the AUP for publication of images on the website and other publications. Similar permission is gained from older secondary age students, reflecting their lead ▪ learn ▪ protect ▪ engage www.somersetelim.org Programme of work for Data Protection Survey personal rights. Members of the school are encouraged to use digital and video images to promote the quality of their learning, but are also educated about the risks associated with the taking, use, sharing, publication and distribution of images (and in particular the risks attached to publishing their own images on the internet). Staff are encouraged to use digital and video images to record learning and to celebrate success, but are aware of the need to take care about the nature of the activities being recorded and to avoid the potential for young people to be identified from published images. Digital images are always stored securely and disposed of appropriately. Infrastructure > Password Level 1: There is no agreed password policy Level 2: Password policies are being developed. Level 3: The school has a password policy which applies to all users. Passwords are secure and are consistent with national and Local Authority Information Security guidance. Level 4: The school has clearly understood and accepted policies relating to the use of passwords. Passwords are secure and consistent with national and Local Authority Information Security guidance. Password procedures are age appropriate. Password changes are regularly enforced. Users understand that passwords must never be shared. There are clear procedures for the provision of new passwords, with forced changes at first log-in. All users have clearly defined access rights to school ICT systems. There are clear policies for the use and control of the “master/administrator” passwords. Level 5: The school has clearly understood and accepted policies relating to the use of passwords. Passwords are secure and fully compliant with national and Local Authority Information Security guidance, with rigorous testing against these standards. Password procedures are age appropriate. Password changes are regularly enforced. Users understand that passwords must never be shared. There are clear procedures for the provision of new passwords, with forced changes at first log-in. All users have clearly defined access rights to school ICT systems. There are clear policies for the use and control of the “master / administrator” passwords. There are regular audits of user log ins to check for anonymous or unauthorised log ins. There is regular testing of systems to ensure that the password security policy is being correctly implemented. Infrastructure > Personal Data Level 5: There is no agreed Personal Data policy. Level 4: A Personal Data policy is being developed. Level 3: The school has a Personal Data policy. All staff know and understand the need to ensure the safe keeping of personal data, minimising the risk of its loss or misuse. (Adhering to the Data Protection Act and relevant national guidance). Parents and carers are informed about their rights and about the use of personal data through the Privacy Notice. Award Level. Level 4: The school has a Personal Data policy. All staff know and understand the need to ensure the safe keeping of personal data, minimising the risk of its loss or misuse. (Adhering to the Data Protection Act and relevant national guidance). Clear policies about the secure handling, transfer and disposal of data (passwords, encryption, and removable media) are known, understood and adhered to by users. Parents and carers are informed about their rights and about the use of personal data through the Privacy Notice. Password protection is enhanced by the use of encryption and/or two factor authentication for the handling or transfer of sensitive data. The school has appointed a Senior Risk Information Officer/Data Protection Officer and Information Asset Owners. Level 5: The school has a Personal Data policy. Staff know and understand the need to ensure the safe keeping of personal data, minimising the risk of its loss or misuse. (Adhering to the Data Protection Act and relevant national guidance). Clear policies about the secure handling and transfer of data (passwords, encryption, and removable media) are known, understood and adhered to by users. Parents and carers are informed about their rights and about the use of personal data through the Privacy Notice. Password protection is enhanced by the use of encryption and/or two factor authentication for the handling or transfer of sensitive data. The school has appointed a Senior Risk Information Officer/Data Protection Officer and Information Asset Owners. All protected data is clearly labelled with Impact Labels. There is a clear procedure in place for audit logs to be kept and for reporting, managing and recovering from information risk incidents. lead ▪ learn ▪ protect ▪ engage www.somersetelim.org