Quick Info

Safeguarding

For further information on safeguarding please click here.

Admissions

Hollinwood Acacademy admissions policy is available to view/download. Click here to read more.

Weekly Blog

Stories and information about our School. Click here to view the blog.

Calendar

Monday, July 5

TBA

Thursday, July 18

D of E Gold Expedition

Friday, August 1

Holiday Club trip to Alton Towers

E-safe award

Technology is part of our everyday life and personal devices such as mobile phones, tablets and iPads are used by many of you at New Bridge. We want you to be able to use social media, personal devices and technology in general at school. We want to make sure you have the skills to use technology and social media safely and respectfully. The e-Safe Award has been set up to recognise students who fully understand e-Safety. To gain the award you will need to complete the 5 sessions and pass a final test. You will also need to agree to the e-Safe rules and sign the Young Person Acceptable Use Agreement. You will then be presented with the e-Safe Award and be expected to be a role model to others when using technology in school.

What the e-Safe Award will involve:

Session 1

  • Types of technology
  • Types of e-safety
  • E-safe rules
  • How to report

Session 2

  • Types of Malware
  • Safe use of emails
  • Protecting your computer devices

Session 3

  • What to do about cyberbullying
  • Safe use of social media
  • Understanding grooming

Session 4

  • Understanding what is against the law
  • Fake profiles
  • Copyright
  • Sexting

Session 5

  • Understanding what radicalisation means
  • Knowing what extremism is
  • Signs of radicalisation

Session 6

  • Talk about being an e-safe role model
  • Recap the topics of e-safety
  • Complete the e-Safe Award test

Session 1

Technology has changed the way we live our everyday lives.  From setting our alarm clock, to buying our food, to communicating with our friends, to socialising at the weekend, technology is shaping the world we live in. We use so much technology from day to day, why shouldn’t we use this technology in school? But when we do use technology, we have to be safe and respectful.

What do you think e-Safety is?

The ‘e’ in e-safety stands for electronic so we can be talking about any kind of electronic device like a phone, tablet, computer or games console. We also mean the way we use the internet too.

Task 1: Read the e-Safe Rules on the Home Page.

  • Do you understand them?
  • Do you agree with them?

Task 2: Talk to the person next to you about the different technology you use.

  • Make a list of all the different types of technology you use.
  • Share the list with the group.
  • How many are there?

Task 3: Look at the slideshow

  • What are the possible solutions?

Task 4: Go to the Report a Problem page.

  • Discuss with teacher how to report issues.
  • List when you might use this page.
  • Click the CEOP button.
  • Look at the website.
  • List when would you use this report button.

Session 2

The Internet is great for communicating, research and playing games but it requires an understanding of safety and security. This session will look at some of the risks involved when using computers, mobile phones or surfing the internet. We will also look at the different measures to take to secure our personal information.

Task 2: Watch the short film below.

Will this be the future?

We need to protect our computers and devices. We need a firewall.

So, what is a firewall? Watch the video below and then go on to Task 3

 Task 3: Go to the Sorted website

Click on the different silhouettes to find out about security and protection.

Answer these questions:

  • What is a Firewall?
  • What is anti-virus software?
  • What is Spyware?
  • What is Trojan?
  • What can you do about Pop Ups?- How can you prevent SPAM or Phishing Scams?
  • What makes a safe password?

Task 4: Practise each security measure:

  • Locate the security settings
  • Check the Firewall is switched on and Anti-virus is installed
  • Locate the junk email icon and know how to report any junk mail as phishing
  • Go into Internet Options
  • Turn on Pop-up blocker

Task 5: Watch the video on malware

OK, so let’s recap…watch the video to remind yourself of the different types of malware

TOP TIPS FOR A SECURE DEVICE:

  • Make sure your Firewall is turned on.
  • Install anti-virus software.
  • Use strong passwords with numbers and letters.
  • Have different passwords for different websites.
  • Change your password regularly.
  • Only open email attachments from people you trust.
  • Regularly back up your files, photos etc.
  • Switch browser security settings to high.
  • Install recommended updates.
  • Turn on Pop-up Blocker
  • Don’t post any pictures, videos or messages that you wouldn’t like your parents to see.

Session 3

Technology and social media is a major part of everyday life for many people. 91% of people now use the internet at home. 64% of people have a Facebook profile. 28% have been abused online. Remember, if you use social media you should present yourself the same as you would in all public places. Online and off, it’s important to represent yourself as the kind of person you want to be. So what is social media?

Task 1: Answer these questions

Talk about the different types of social media – what can you do on them?

What are the risks?

Task 2: Understanding Cyber-bullying

Cyber-bullying is when a persons sends a hurtful message to someone using technology. Perhaps it’s a text message, or a post, an email or blog. It’s easy to get caught up in the moment and write or do something that may seem hilarious at the time. But remember, what you say can really hurt someone, or come back to haunt you. Think before you post. It only takes a second or two. Ask yourself if you really want to say it. Make sure you don’t mind if your friends, classmates or teachers hear about it later.

Also remember that any information you post might be copied, pasted and distributed in ways that you didn’t intend. Before you post, ask yourself – would I be ok if this content was shared widely at school or with my future employer?

If you ever receive hurtful or abusive messages or posts on your profile page you have options. Depending on how serious the situation is, you can ignore it, ask the person to stop, unfriend or block the person, or tell your parents, a teacher, or another adult you trust.

Task 3: Log in to your social media accounts and set up your privacy settings.

Click on the links below to find out how to do certain things on Facebook. Ask others in the group for help.

Top Tip: Disable options, then open them one by one. Its better to set what you need, rather than start with everything accessible.

Blocking and privacy settings in general are very easy to use on most devices. Below are some step by step guides to block people or set your account to private. However, these can often change and look slightly different for different devices or different forms of social media.

Making the changes usually just involves clicking on the settings icon which often looks like a gear cog or padlock like this:

To block someone on Instagram:

  1. Tap their username to go to their profile.
  2. Tap (iPhone/iPad) or (Android) in the top right.
  3. Tap Block.

To report someone’s account:

  1. Go to their profile and click next to their username.
  2. Select Report user.
  3. Click the type of account you want to report and follow the on-screen instructions.

Task: Go into your social media accounts on your phone or device and set your privacy settings to private/friends and if there is anyone you don’t know, block them.

TOP TIPS FOR SAFE SOCIAL MEDIA

Don’t share your password with anyone.

Only accept friend requests from people you know.

Don’t post anything you wouldn’t want your parents, teachers or employer to see.

Be authentic. The real you is better than anything you might pretend to be.

Set your privacy settings, and review them often.

Task 4: Watch the Video about Grooming

Although it’s against the Facebook terms to lie about your name or age, people still do. Anyone can create a fake profile. So that means you can never know who you are communicating with online.

REMEMBER:

Never give out your personal details online.

Never arrange to meet with a stranger you’ve met online.

If anything makes you feel uncomfortable, report it.

Session 4

This section looks at what types of misuse are against the law.

Creating Fake Accounts

Many people think setting up a fake account is a bit of a laugh but the truth is that creating a fake account in someone else’s name is illegal. Click on the newspaper articles below to read the stories and answer the following questions..

Task 1: Talk in your group about fake accounts

  • Why do you think people create fake accounts?
  • What are the consequences of setting up fake accounts?

Sexting – What is it?

Sexting is when someone shares sexual, naked or semi-naked images or videos of themselves or others, or sends sexually explicit messages.

Messages can be sent using mobiles, tablets, smartphones, laptops – any device that allows you to share media and messages.

Sexting is illegal. This is what the law says:

Copyright

As we all know, technology has changed the way we watch our favourite movies or TV shows, listen to songs or buy music, and we can view so much content on the internet with our mobile phone, PC or tablet. However, it is illegal to download content without the permission of the owner. It can be very confusing because there are so many sites to view digital media so we will look at different ways to view media legally and how to stay on the right side of the law.

Task 2: Talk in your group about copyright

Copyright is when a person or company creates art, music, film, books, etc – that person has the right to control the use of their work.

  • Why do you think copyright is important?
  • What do you think will happen if you break copyright laws?
  • What do you need to do to make sure you don’t break the law?

If you want to copyright your own work, mark it with the international copyright symbol © followed by the name of the creator.

Task 3: Visit the website ‘The Content Map’

Click here to find different sites where it is legal to watch TV, Film, Music etc.

Task 4: Watch the News Report about online abuse

It is against the law to abuse someone online.

  • What happened to these two Twitter Trolls?
  • Is it right that people should be punished for cyber-bullying?
  • How can we all stop this kind of abuse?

DON’T BE A TROLL, BE A FRIEND!

Remember, just report any online abuse to the online police (CEOP)

TOP TIPS FOR LEGAL USE OF TECHNOLOGY

Use respected sites to view videos, music and TV.

Don’t take someone’s work and pass it off as your own.

Online abuse is illegal, report it!

CEOP is the online police and many sites now have a ‘report button’

Session 5

Radicalisation and Extremism

During this lesson we will learn about the different types of extremism and how people can be radicalised. Within your group, discuss some of the questions below and read some of the definitions. There are also some videos to watch on the Side by Side website.

Task 1: Q & A

What is radicalisation?

  • Radicalisation is the way in which extremists get other people to join them and believe that crime and violence is the right way to support a cause.

What is extremism?

  • Ideas and actions that are far outside the ‘norm’. Extremists make things happen by encouraging hatred, violence or with criminal acts.

Who are extremists?

  • People stereotype Muslims as extremists because terrorist acts are being carried out by some Muslims…BUT extremists are from different religions, cultures or countries.

So what causes extremism?

  • Hopelessness or a sense of powerlessness
  • Lack of education and poverty
  • Unemployment and despair about the future
  • Feeling you are a victim of some injustice
  • Occupation of your home country by foreign forces

Task 2: Who are the terrorists?

Take a look at this slideshow to see some of the biggest terror attacks carried out around the world. Try to guess who carried out such awful terror attacks..

Task 3: Side by Side (video stories)

Gather round the screen with your teacher and click the picture to open the web resource below..

Click on the different pages, watch the videos and talk about the way Mark and Louise are targeted by extremists.

So, what is the answer to extremism?

What kind of person is radicalised?

  • Feels alone or isolated
  • Sense of injustice
  • Difficult home life
  • Victim of bullying or hate crime
  • Desire for status/adventure/excitement

Signs a person is being radicalised:

  • Change in behaviour/appearance
  • Disassociates from friendship groups
  • Locks self away in bedroom – secretive use of internet
  • Increase in aggression and violence
  • Other criminal activity
  • Vocalises extremist views

Session 6

This session is a recap of what you’ve learned on the e-Safe Award. It is important that you go over the key points that you’ve discussed before taking the final e-Safe test. So, what are the key points?

  • The e-Safe Rules
  • Types of e-Safety risks
  • Malware, SPAM and other viruses
  • Keeping your information private
  • Reporting an e-Safe issue
  • Safe use of social media
  • Recognising grooming
  • Understanding privacy settings
  • Knowing about copyright

One final thing to check is that you have signed the Young Person Acceptable Use Agreement. Your teacher will check for you but you cannot gain the e-Safe Award until you have signed this agreement.

Now that you have revised the e-Safe award, you can take the test.

Click here to complete the questionnaire.

The results will be emailed to Mr Bright and if you pass the test the e-Safe Award will be presented to you in school assembly.

Location

Hollinwood Academy
Roman Road
Hollinwood
Oldham
OL8 3PT

School Hours

M-F: 8am – 4pm
Weekends: Closed

Phone & Email

0161 883 2404

info@hollinwoodacademy.org