Skip to main content

Safer Internet Centre

Do you have a cyberbullying or digital safety concern?

helpline@saferinternet.org.uk 0844 381 4772

Appropriate Monitoring

Guide for education settings and filtering providers about establishing 'appropriate levels of monitoring'

The aim of this document is to help schools (and providers) comprehend, in conjunction with their completed risk assessment, what should be considered as ‘appropriate’ monitoring.

Monitoring Strategies

There are a range of monitoring strategies and systems however the appropriate monitoring strategy selected should be informed by your risk assessment and circumstances.  It is also vitally important to also review and refine the relevant policies as part of assessing (or implementing) a monitoring strategy or system. 

The following are examples.

1) Physical Monitoring

Most suited where circumstances and the assessment suggests low risk, with staff directly supervising children whilst using technology.  This could be: physical supervision of children whilst using the Internet; assigning additional classroom support staff to monitor screen activity; or actively monitoring all screen activity during a lesson from a central console using appropriate technology.

The following are possible limitations or points to consider

  • Can be resource intensive
  • Less effective across a larger group or a group using mobile devices
  • Students often adapt screen behaviour to avoid monitoring
  • Advantage of immediate intervention when an issue arises which can be developed as a teaching opportunity

2) Internet and web access

Some Internet Service Providers or filtering providers provide logfile information that details and attributes websites access and search term usage against individuals. Through regular monitoring, this information could enable schools to identify and intervene with issues concerning access or searches. 

The following are possible limitations or points to consider:

  • Assign appropriate responsibility for analysing the logfile information. These reports can often be difficult to understand and may require specialism to analyse. 
  • The frequency that block or monitoring lists are updated by your provider
  • The logfile information should be able to identify an individual user (or group as appropriate) for effective intervention
  • Logs need to be regularly reviewed, interpreted and alerts prioritised for intervention
  • Information held by the school that indicates potential harm, must be acted upon
  • Be aware of any limitations of the logfile information

3) Active/Pro-active technology monitoring services

Where the risk is assessed as higher, Active or Pro-active monitoring technologies may be suitable.  These specialist services provide technology based monitoring systems that actively monitor use through keywords and other indicators across devices. These can prove particularly effective in drawing attention to concerning behaviours, communications or access.

These systems can take the form of:

  1. Active monitoring where a system generates alerts for the school to act upon
  2. Pro-active monitoring where alerts are managed by a third-party provider and may offer support with intervention. 

The following are possible limitations or points to consider

  • Can be expensive in terms of installing and maintaining technology
  • Pro-active monitoring uses specialist organisations and may involve additional expense
  • Active monitoring requires sufficient internal capability and capacity
  • Active monitoring can initially generate significant volumes of information and alerts which can be difficult to interrogate and interpret.
  • Assign appropriate Safeguarding expertise to review, prioritise and take action on alerts that signal potential harm

Monitoring Content

Recognising that no monitoring can guarantee to be 100% effective, schools should be satisfied that their monitoring strategy or system (including keywords if using technical monitoring services) at least covers the following content:

  • Illegal: content that is illegal, for example child abuse images and terrorist content
  • Bullying: Involve the repeated use of force, threat or coercion to abuse, intimidate or aggressively dominate others
  • Child Sexual Exploitation: Is encouraging the child into a coercive/manipulative sexual relationship. This may include encouragement to meet.
  • Discrimination: Promotes the unjust or prejudicial treatment of people on the grounds of race, religion, age, sex, disability or gender identity.
  • Drugs / Substance abuse: displays or promotes the illegal use of drugs or substances
  • Extremism: promotes terrorism and terrorist ideologies, violence or intolerance
  • Pornography: displays sexual acts or explicit images
  • Self Harm: promotes or displays deliberate self harm
  • Violence: Displays or promotes the use of physical force intended to hurt or kill
  • Suicide: Suggest the user is considering suicide

Monitoring Strategy/System Features

Schools should consider how their system integrates within their policies (see templates) and should satisfy themselves that their monitoring strategy meets the following principles:

  • Age appropriate – includes the ability to implement variable monitoring appropriate to age. This will in turn define which alerts are prioritised and responded to.
  • BYOD (Bring Your Own Device) – if the system includes the capability to monitor personal  mobile and app technologies (ie not owned by the school), ensure it is deployed and supported and how data is managed.  Does it monitor beyond the school hours and location
  • Data retention – should be clear what data is stored, where and for how long
  • Devices – if software is required to be installed on devices, the monitoring system should be clear about the devices (and operating systems) it covers
  • Flexibility - changes in keywords (addition or subtraction) can be easily according to an agreed policy.
  • Impact - How do monitoring results inform your policy and practice?
  • Monitoring Policy – How are all users made aware that their online access is being monitored? How are expectations of appropriate use communicated and agreed?  Does the technology provider, offer any advice or guidance?
  • Multiple language support – the ability for the system to manage relevant languages
  • Prioritisation – How alerts generated via monitoring are prioritised to enable a rapid response to immediate issues. What operational procedures are in place to facilitate that process?
  • Reporting – how alerts are recorded, communicated and escalated?

Monitoring systems require capable and competent staff to sufficiently manage them, together with the support and knowledge of the entire staff.  Monitoring systems are there to safeguard children and the responsibility therefore should lie with the school leadership/governors and Designated Safeguarding Lead.

Filtering and monitoring systems are only ever tools in helping to safeguard children when onlineand schools have an obligation to “consider how children may be taught about safeguarding,including online, through teaching and learning opportunities, as part of providing a broad andbalanced curriculum”