Blogs
Child Safeguarding Software and Data Protection: Best Practices Guide
19 min
introduction to child safeguarding software child safeguarding software systems, such as cpoms (child protection online management system), have become essential tools for educational institutions and organisations working with children these platforms provide secure, efficient methods for recording, managing, and monitoring child protection concerns what is cpoms? cpoms is a leading safeguarding software used by schools and educational institutions to document and monitor child protection concerns it allows staff to record incidents, concerns, and observations in a centralised, secure database that designated safeguarding leads can access key features of cpoms centralised recording all safeguarding information is stored in one secure location chronological records incidents are recorded chronologically, creating a timeline of events alert system automatic alerts to designated staff when new information is added document storage secure storage of relevant documents restricted access different access levels ensure information is only available to authorised personnel reporting generate reports for analysis and statutory requirements similar safeguarding systems while cpoms is widely used, there are other child safeguarding systems available system key features myconcern safeguarding software that combines all the essential safeguarding tools you need in one easy to use platform eclipse allows you to record and manage all safeguarding and well being concerns easily cpoms safeguarding and well being solution for schools tootoot safeguarding software for schools that focuses on bullying and mental health to support students better the role of the data protection officer (dpo) in the context of child safeguarding software, the data protection officer plays a crucial role in ensuring compliance with data protection regulations core responsibilities of a dpo monitoring compliance ensuring the organisation adheres to data protection regulations, including gdpr, when processing sensitive safeguarding data risk assessment conducting data protection impact assessments (dpias) before implementing safeguarding software training and awareness providing training to staff on data protection principles in relation to safeguarding information point of contact serving as the contact point for data protection authorities policy development creating and maintaining data protection policies specific to safeguarding software use data subject rights managing access requests from parents/guardians while balancing safeguarding needs dpo and safeguarding software implementation when implementing safeguarding software like cpoms, the dpo should be involved from the beginning to ensure appropriate legal basis for processing is identified and documented data minimisation principles are applied retention periods are established and enforced security measures are adequate for the sensitive nature of the data staff roles and access permissions are clearly defined data sharing agreements are in place with third parties, if applicable balancing safeguarding and data protection one of the key challenges for educational institutions is striking a balance between sharing information for safeguarding purposes and complying with data protection requirements article 66 of keeping children safe in education (kscie) protects safeguarding and causes for concern, while child on child behaviour, parent conversations, and observation activities are subject to disclosure key principles to consider lawful basis establish and document the lawful basis for processing and safeguarding data necessity only collect and share information that is necessary for safeguarding purposes proportionality ensure the extent of information sharing is proportionate to the safeguarding concern transparency be open with data subjects about how their information will be used, while considering safeguarding needs security implement robust security measures to protect sensitive data keep to the facts ensure the commentary is factual and not based on personal opinion content write your commentary on the view that the data subject, law enforcement, and the judicial system might read it information sharing framework develop a clear framework for when and how information should be shared internal information sharing external information sharing parental/guardian access best practices for implementation staff training requirements comprehensive training is essential for effective and compliant use of safeguarding software initial training all staff should receive basic training on using the system role specific training additional training for designated safeguarding leads and administrators data protection awareness training on data protection principles specific to safeguarding information regular refreshers schedule annual refresher training to keep knowledge current new staff induction include safeguarding software training in onboarding processes policy development develop clear policies covering acceptable use of the safeguarding software recording standards (what to record and how) information classification and access controls data retention and deletion procedures breach reporting procedures data subject rights requests handling compliance requirements gdpr considerations key gdpr requirements when using safeguarding software legal basis identify appropriate legal basis (usually public task, legal obligation, or vital interests) special category data apply additional safeguards for processing special category data data protection impact assessment complete a dpia before implementation privacy notices update privacy notices to include information about safeguarding data processing data processor agreements ensure appropriate contracts are in place with software providers international transfers check if data is transferred outside the uk/eea and ensure adequate safeguards sector specific requirements consider additional requirements depending on your sector education keeping children safe in education guidance, ofsted requirements healthcare nhs digital data security and protection toolkit social care social care records practice guidance charities charity commission safeguarding requirements audit and review regular system audits implement regular audits of your safeguarding software system review user access rights and permissions audit logs of system access quality check records for compliance with recording standards review retention implementation test security controls policy review schedule establish a regular review schedule for all safeguarding and data protection policies annual review of all policies additional reviews following significant changes in legislation or guidance reviews following any safeguarding incidents or data breaches stakeholder consultation as part of the review process conclusion child safeguarding software, such as cpoms, offers valuable tools for protecting children however, careful attention to data protection principles is essential when implementing it the data protection officer plays a crucial role in ensuring safeguarding needs are met while maintaining compliance with data protection regulations by establishing appropriate policies, providing training, and ensuring oversight, organisations can effectively balance these requirements to create a robust safeguarding framework additional resources ico guide to data protection keeping children safe in education nspcc safeguarding resources