Photos of early years children on an orange background. Early Years settings in blue text. Data Protection and Cyber security in white text. Data Protection Education logo and website address: www.dataprotection.education

🧸 🚼As digital technology continues to increase in our educational settings, Early Years settings are increasingly integrating digital tools into their operations.  While this might enhance efficiency and communication, it also raises concerns and challenges about cyber security and data protection.

Photos of different people from different genres in an orange circle. Girl at school in the background. Text says Meeting Digital Standards in Schools and Colleges, Understanding the SLT Digital Lead profile. Data Protection Education logo

👩🏽‍🏫👨🏽‍💻 Since we have been talking to schools and multi academy trusts about the SLT digital lead, there have been a lot of questions about who that should be in the organisation. There’s often an assumption that it should automatically be the IT Manager, technician, or Data Protection Lead.  In this article, we explore the profile of an effective SLT Digital Lead and their critical role in shaping digital strategy, integrating technology into teaching and learning,

hands at a laptop with virtual image of a contract popping out of the keyboard. Data protection education logo

📃 A digital technology contracts register is a lit of all the contracts in your organisation with external suppliers for the supply of digital technology products and services.

Meeting Digital Standards in schools and colleges. Children working in school in the background. Data Protection Education logo

🍂 The DfE have published several updates to the DfE Digital Standards, updating the Filtering and Monitoring Standards, the Digital Leadership & Governance Standards and the Broadband Internet Standards for Schools and Colleges. We give our view on what that means and more details about the updates.

Young girl bursting through paper pointing to text saying 'Stealing children's data'. Data Protection Education image

In a Malwarebytes blog, author Mark Beare explains how your child's data can be stolen, and even more so if you have given medical  or health data.

Collage of photos: Harry the Hacker, Where's Harry training poster, seats at a training session, data protection education bag

Schools are back in full swing, and so is our work at Data Protection Education! This week, we’ve been busy with data walks, on-site training, and booking meetings across various schools to ensure data protection standards are up to date and effective.

Orange and blue circles at the front of a photo of children in school.  Meeting Digital Standards in Schools and Colleges text. Data Protection Education logo.

The data protection officer is mentioned many times in the DfE Digital Standards for Schools and Colleges as someone that should either be informed or consulted with.  As part of that consultation process, we would like to announce our new DfE Digital Standards for Schools and Colleges Tracker.

  1. Schools and Trusts Best Practice Area
  2. The DPE Retention Schedule
  3. Making the Rounds Update (now includes reporting)
  4. ESFA Cyber Essentials Requirement for Colleges from 2024/2025
  5. ICO Reprimands a School
  6. Navigating Privacy at the End of Term , Special Occasions and End of Year
  7. Out of date technology
  8. Data Retention and the Pupil File
  9. Have you assigned your SLT Digital Lead yet?
  10. Getting Started with AI (Artificial Intelligence)
  11. Cyber attack on a school during half term
  12. Update to the DfE Digital Cyber Security Standards for Schools and Colleges (May 2024)
  13. The rise of cyber attacks in schools are causing pupils to miss classes
  14. ICO: Learning from the mistakes of others report
  15. Cyber attack on a Trust; the aftermath
  16. School Focus: The Vale Federation | Aylesbury
  17. DfE Dealing with Subject Access Requests (SARs) Guidance
  18. Update to the Guidance on Information Sharing from the DfE
  19. FOI Requests generated by Artificial Intelligence
  20. Social Media Best Practice Area
  21. Lettings Best Practice Area
  22. Appropriate filtering and monitoring definitions
  23. MFA Bombing - What is it?
  24. Protecting your Social Media Accounts
  25. Why we recommend using checklists
  26. Product Focus on Checklists : Initial Trust Plan
  27. Product Focus on Checklists : End of Term Checklist
  28. Product Focus on Checklists : Information and Cyber Security
  29. Product Focus on Checklists : Social Media
  30. Product Focus on Checklists : Lettings
  31. Product Focus on Checklists : Record of Processing
  32. Milk Island: The secret location that allows children to view restricted content on Google Maps
  33. Why Data Should Stay Put: Benefits of Keeping Data in Its Original System
  34. Product Focus on Checklists : Data Retention and Destruction
  35. Product Focus on Checklists : Data Migration
  36. Product Focus on Checklists : Biometrics
  37. Product Focus on Checklists : Supplier Due Diligence
  38. Free Cyber help, advice and training with the Cyber Resilience Centres
  39. The Perils of Paper: The Printing Vulnerability
  40. Product Focus on Checklists : FOI
  41. Product Focus on Checklists : Governors and Data
  42. Product Focus on Checklists : DPIA
  43. Product Focus on Checklists : Site Moves
  44. Product Focus on Checklists : Data Breaches
  45. Product Focus on Checklists : Subject Access Requests
  46. Product Focus on Checklists : Bring your own device
  47. Product Focus on Checklists : Working out of school/offsite
  48. Cyber Attack on a School
  49. Product Focus on Checklists : Redaction
  50. Why Due Diligence is Important: Fake apps
  51. Product Focus on Checklists : CCTV
  52. Product Focus on Checklists : Clear desk
  53. Product Focus on Checklists : Commitment to compliance
  54. Product Focus on Checklists : Photos and video
  55. Product Focus on Checklists : Passwords
  56. Product Focus on Checklists : Information Classification
  57. Free cyber training for staff
  58. DfE Digital Standards Update
  59. The Mother of all Breaches
  60. ClassCharts Possible Data Breach
  61. Where is your data stored?
  62. IAPP looks at AI privacy risks
  63. If you suspect a financial scam .....
  64. Guardians of Privacy: 16. Social Media Checklist
  65. Guardians of Privacy: 15. Navigating Social Media in Educational Settings Summary
  66. Guardians of Privacy: 14. Social Media and Cyber Bullying
  67. Guardians of Privacy: 13. Social Media, Copyright and Intellectual Property
  68. Guardians of Privacy: 12. Social Media and Going Viral
  69. Guardians of Privacy: 11. Staff Social Media Accounts
  70. Guardians of Privacy: 10. Social Media and Cookies
  71. Guardians of Privacy: 9. Social Media and Morality
  72. New Resources for Schools from the ICO
  73. Guardians of Privacy: 8. Social Media Policies
  74. Guardians of Privacy: 7. Social Media Data Retention
  75. Guardians of Privacy: 6. Posting Safely
  76. Guardians of Privacy: 5. Social Media and Consent
  77. Guardians of Privacy: 4. Social Media Access Control
  78. Guardians of Privacy: 3. Social Media Channels
  79. Guardians of Privacy: 2. Law and Regulations
  80. Guardians of Privacy: 1. Social media, privacy and children
  81. The ICO reprimands a Multi Academy Trust
  82. KCSIE: Filtering, Monitoring and Privacy
  83. Guidance for the use of school email and applying email retention in schools
  84. Data Protection Tips for Early Years Settings
  85. Children's Privacy around the world is a puzzle
  86. Trust Initial Plan Checklist Update
  87. Records Management Best Practice Update
  88. Governors and Data Best Practice Area Update
  89. What do I need to redact?
  90. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  91. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  92. Lettings Best Practice and Guidance
  93. Considerations when migrating to a new MIS
  94. Public bodies and sensitive data
  95. ICO: 10 Step guide to sharing information to safeguard children
  96. Help after a Cyber Attack/Incident
  97. Data Protection and Cyber Security (Inset Day) Training Ideas
  98. Handling Freedom of Information Requests the right way
  99. Where's Harry the Hacker?
  100. The ICO Reprimands a school
  101. Subject Access Requests (SARs)
  102. Using WhatsApp in Schools
  103. How to contact us for support, subject access requests, data breaches and FOI's
  104. How the Record of Processing Can Help You
  105. What does a Data Protection Officer Do?
  106. Blog: Best Practice on the Retention of Child Protection Information
  107. Carrying out Supplier Due Diligence
  108. Email and retention periods
  109. How Long Should You Keep Personal Data For?
  110. Sharing this year’s Nativity play online
  111. A quick introduction to the Phishing Simulation tool
  112. B&H FoI: Racist/religious incidents/bullying
  113. Protocol for Setting Up and Delivery of Online Teaching and Learning
  114. Class Dojo International Data Sharing
  115. Model Publication Scheme: Amendments, Improvements and Updates
  116. Transparency
  117. Parents and students covertly recording conversations
  118. SAR? ER? FOI?
  119. Secure file transfer of files using Royal Mail
  120. Emergency contacts and consent
  121. Key elements of a successful DPIA
  122. FOI Publication Schemes
  123. Best Practice for Managing Photos and Video
  124. New Drip Feeds: Recognise and Respond to Subject Access Request
  125. When to contact the Data Protection Officer?
  126. National child measurement programme
  127. Make sure DPE is your registered DPO with the ICO
  128. Headteacher fined for breach of data protection legislation

Search