SlideShare a Scribd company logo
1 of 23
Download to read offline
Safeguarding and Risk Assessment in the learning
and skills sector
Phil Barnett
LSIS Associate
Aim
Aim:
To explore and apply a model of risk assessment to a
safeguarding challenge
Objectives
• To consider specific situations that should be subject to a risk
assessment process
• To identify appropriate interventions that can be applied in
order to mitigate against risk
• To review current organisational practice and identify how
these can be further improved
Definitions
Risk Management
Risk management is a central part of any organisation’s
strategic management. It is the process whereby
organisations methodically address the risks attached to
their activities with the goal of achieving sustained
benefit within each activity and across the portfolio of all
activities.
The focus of a good risk management process
is the identification and treatment of these risks.
Source: Institute of Risk Management (IRM) Risk
Management Standard
Risk Assessment
Who/what is at risk?
Risk Assessment
The workforce
Learners
The
Organisation
What is risk assessment?
A risk assessment is simply a careful examination of
what, in your organisations context, could cause
harm. You can then decide whether you have taken
enough precautions or should you do more to prevent harm.
Adapted from the Health and Safety Executive (HSE)
Risk Assessment Information sheet
Definitions
• Child or young person: up to their 18th birthday (UN convention
of the Rights of the Child)
• Vulnerable adult: a person who has attained the age of 18, and:
• Is receiving any form of health care
• Is receiving a service or participating in an activity which is
specifically targeted at people with age-related needs,
disabilities or prescribed physical or mental health conditions
or expectant or nursing mothers living in residential care
• Age-related needs includes needs associated with frailty,
illness, disability or mental capacity
For more details see Section 59 of Safeguarding Vulnerable
Groups Act 2006.
What are we safeguarding
learners from?
Safeguarding learners from
• Sexual abuse or inappropriate relationships
• Grooming
• Physical and emotional abuse or neglect
• Domestic violence
• Inappropriate parenting
• Inappropriate supervision by staff/volunteers i.e. ‘bad practice’
• Bullying, cyber-bullying
• Self-harm, risky behaviour
• Unsafe activities and environments
• Accidents e.g. road, home
• Crime
• Fear of crime
• Exploitation including financial abuse, sexual exploitation,
forced marriage
• Immigration issues
• Potentially unsafe environments e.g. parks, sports
grounds
• Homelessness and unsuitable housing
• Victimisation due to race, sexuality, faith, gender,
disability and so on
And…
Identifying the potential safeguarding risks:
Group Activity:
With these definitions in mind and from your
experience identify a range of safeguarding
situations that are subject to a risk
management and assessment process.
These might apply to learners, staff, visitors,
the organisation
When the list is complete prioritise them to
low, medium and high risk situations
Safeguarding and Risk Assessment
The following areas may be covered by your Risk
Assessment process:
• Trips
• Work placements
• Certain workshop/practical activity
• Lone Working
• Other Learners (where applicable)
• Home visits
• Mixed age groups within one learning cohort
• Multiple sites
• Travel between sites …………
The Five Steps to a Safeguarding Risk Assessment
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
Identify and
detail the situation
that could cause
potential harm
Decide who
might be
harmed and
how
Evaluate the
risk and
decide on
precautions
/interventions
Record and
report your
findings
and agreed
actions
Review your
assessment and
update if necessary
Operational thinking for the identification of risks
Likelihood of occurrence
Certain
6
Likely
5
Probable
4
Possible
3
Remote
2
Improbable
1
Catastrophic
4 24 20 16 12 8 4
Critical
3 18 15 12 9 6 3
Marginal
2 12 10 8 6 4 2
Negligible
1 6 5 4 3 2 1
Impact of
occurrence
MediumLow High
Deciding on the level of Risk
1-7 LOW 7-13 MEDIUM 13-24 HIGH
Low - If risk lies in the low category no additional direct action is required to
address the risk but it is worth identifying and recording so that
everyone is aware and measures can be taken to reduce the risk
should this become necessary.
Medium - Risk in the medium category poses a significant risk and therefore
countermeasures should be taken to reduce the likelihood of
occurrence and/or significance. Contingencies should also be in
place to deal with the risk should it occur.
High - High risks pose a substantial risk and should be evaluated to decide
whether they are tolerable or intolerable. If the risk is deemed
tolerable then activity should only be started once measures have
been taken to reduce the risk and satisfactory contingencies have
been put in place to minimise the impact of the risk
Source: Adapted from PRINCE2 risk management
Case Study Activity
Group presentations and
feedback
Dealing with the Risk
Once a risk has been identified and
analysed - What are the choices?
• Avoidance (eliminate, withdraw from or not become involved)
• Reduction (optimise - mitigate)
• Sharing (transfer - outsource or insure)
• Retention (accept and budget)
Some examples of how a
safeguarding risk can be mitigated
Mitigation
To appoint and train a
lunchtime supervisory team
To put in place escort
arrangements with the
security team
Safeguarding awareness
training for learners
Emergency contact
arrangements
Risk
14-16 year olds lunch
arrangements
Staff member who
needs to clear up after a
restaurant session
Apprentices in the
workplace
External inspection continued…
Compliance or commitment?
• The grade for safeguarding is a ‘limiting’ grade, which impacts
on grades for Leadership and Management and Overall
Effectiveness.
• Compliance is the minimum necessary requirement for a
judgement of ‘adequate’ in safeguarding
• Staff Training – The LSIS Safeguarding Training Modules are
recognised by OfSTED. It will be important for providers to
select the modules best suited to staff roles and responsibilities.
19 © LSIS Sept 2010 Company no 06454450 Registered charity No 1123636 Registered office: Friars House,
Manor House Drive, Coventry CV1 2TE
Further LSIS Safeguarding Training
• Safeguarding in the Learning and Skills Sector
• Safer Staff Recruitment and Safeguarding
• Safeguarding and Human Resource (HR) Practices and Procedures
• Safeguarding and Inspection
• Safeguarding Facilitator Workshop
• Safeguarding Designated Person Workshop
• In house and bespoke activities
Session Evaluation
• As a group reflect on the session and record the
following:
• 3 Low spots about the training
• 3 High spots
• 1 improvement
• In addition record for yourself one aspect that
you are going to take back to your workplace
Contact Details:
Learning and Skills Improvement Service,
Friars House,
Manor House Drive,
Coventry.
CV1 2TE.
(02476) 627 745
safeguarding@lsis.org.uk
Thank you

More Related Content

What's hot

Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesSlideTeam
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Processno suhaila
 
Module 2 - Approaches to Risk Management.pdf
Module 2 - Approaches to Risk Management.pdfModule 2 - Approaches to Risk Management.pdf
Module 2 - Approaches to Risk Management.pdfmarjondimafilis
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides SlideTeam
 
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...SlideTeam
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesSlideTeam
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Complacency the silent killer
Complacency the silent killerComplacency the silent killer
Complacency the silent killerPhil La Duke
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Dhamo daran
 
Workplace safety and health
Workplace safety and healthWorkplace safety and health
Workplace safety and healthshiva5717
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptaminrahman34
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk managementPMC Mentor
 
Risk Management Essentials for Bankers
Risk Management Essentials for BankersRisk Management Essentials for Bankers
Risk Management Essentials for BankersDavid Vu
 

What's hot (20)

Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
 
Risk Management Process
Risk Management ProcessRisk Management Process
Risk Management Process
 
Module 2 - Approaches to Risk Management.pdf
Module 2 - Approaches to Risk Management.pdfModule 2 - Approaches to Risk Management.pdf
Module 2 - Approaches to Risk Management.pdf
 
Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
Compliance Identification Risk Monitoring Risk Mitigation Risk Assessment Reg...
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Complacency the silent killer
Complacency the silent killerComplacency the silent killer
Complacency the silent killer
 
Projectriskmanagement pmbok5
Projectriskmanagement pmbok5Projectriskmanagement pmbok5
Projectriskmanagement pmbok5
 
Workplace safety and health
Workplace safety and healthWorkplace safety and health
Workplace safety and health
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Managemet commitment and safety the slide
Managemet commitment and safety the slideManagemet commitment and safety the slide
Managemet commitment and safety the slide
 
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.pptpractical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
ABC of risk culture. Dr David Hillson
ABC of risk culture. Dr David HillsonABC of risk culture. Dr David Hillson
ABC of risk culture. Dr David Hillson
 
Equality diversity and inclusion
Equality diversity and inclusionEquality diversity and inclusion
Equality diversity and inclusion
 
Step by step guide on project risk management
Step by step guide on project risk managementStep by step guide on project risk management
Step by step guide on project risk management
 
Risk Management Essentials for Bankers
Risk Management Essentials for BankersRisk Management Essentials for Bankers
Risk Management Essentials for Bankers
 
Risk management
Risk management Risk management
Risk management
 

Viewers also liked

How to make appropriate learning materials for various
How to make appropriate learning materials for variousHow to make appropriate learning materials for various
How to make appropriate learning materials for varioustbirdcymru
 
The History of Vaccine
The History of VaccineThe History of Vaccine
The History of Vaccineemullera614
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibitionJisc
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc
 
Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyondJisc
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesJisc
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety dayJisc
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safetyJisc
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awarenessJisc
 
Janet: bring your own device
Janet: bring your own deviceJanet: bring your own device
Janet: bring your own deviceJisc
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialJisc
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe onlineJisc
 
How to use internet effectively
How to use internet effectivelyHow to use internet effectively
How to use internet effectivelyLenny
 
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Jisc
 
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 Connect more with peers and practice: Pecha Kucha sessions - Connected Appre... Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...Jisc
 
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Jisc
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...Jisc
 
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Jisc
 
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightClosing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightJisc
 

Viewers also liked (20)

How to make appropriate learning materials for various
How to make appropriate learning materials for variousHow to make appropriate learning materials for various
How to make appropriate learning materials for various
 
The History of Vaccine
The History of VaccineThe History of Vaccine
The History of Vaccine
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics
 
Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyond
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resources
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety day
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learners
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safety
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awareness
 
Janet: bring your own device
Janet: bring your own deviceJanet: bring your own device
Janet: bring your own device
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorial
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe online
 
How to use internet effectively
How to use internet effectivelyHow to use internet effectively
How to use internet effectively
 
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
Leveraging change through digital capability - Scott Hibberson, Marcus Elliot...
 
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 Connect more with peers and practice: Pecha Kucha sessions - Connected Appre... Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
Connect more with peers and practice: Pecha Kucha sessions - Connected Appre...
 
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
Connect more with peers and practice: Pecha Kucha sessions - University of Bi...
 
How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...How you can enhance your efficiency and effectiveness for teaching and learni...
How you can enhance your efficiency and effectiveness for teaching and learni...
 
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...Making a difference with technology-enhanced learning - Sarah Knight and Sara...
Making a difference with technology-enhanced learning - Sarah Knight and Sara...
 
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah SpeightClosing plenary - Connect more with the future - Andy McGregor and Sarah Speight
Closing plenary - Connect more with the future - Andy McGregor and Sarah Speight
 

Similar to E safety safeguarding and risk assessment

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxssuser107f14
 
Risk Management.pptx
Risk Management.pptxRisk Management.pptx
Risk Management.pptxGraciaSuratos
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTVolunteer Alberta
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Managementmyosh team
 
risk_assessment_presentation.pdf
risk_assessment_presentation.pdfrisk_assessment_presentation.pdf
risk_assessment_presentation.pdfAlexanderRose31
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enocasiconference
 
Debunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskDebunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskTony Zemaitis
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptxwaleed50405
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core ConsultingCORE Consulting
 
Module 15 - Risk Management.pptx
Module 15 - Risk Management.pptxModule 15 - Risk Management.pptx
Module 15 - Risk Management.pptxcaniceconsulting
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docxCPA Australia
 
Keeping children safe - standards iii
Keeping children safe - standards iiiKeeping children safe - standards iii
Keeping children safe - standards iiiFelixLozano
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfHari319621
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Risk Management
Risk ManagementRisk Management
Risk ManagementMjNuarin
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119KAYODE ADEBIYI
 

Similar to E safety safeguarding and risk assessment (20)

RISK MANAGEMENT.pptx
RISK MANAGEMENT.pptxRISK MANAGEMENT.pptx
RISK MANAGEMENT.pptx
 
Risk Management.pptx
Risk Management.pptxRisk Management.pptx
Risk Management.pptx
 
risk management.pdf
risk management.pdfrisk management.pdf
risk management.pdf
 
CAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPTCAVR 2009 Risk Management PPT
CAVR 2009 Risk Management PPT
 
Operational Leadership and Critical Risk Management
Operational Leadership and Critical Risk ManagementOperational Leadership and Critical Risk Management
Operational Leadership and Critical Risk Management
 
Risk Management - Conference 2009 (A1)
Risk Management - Conference 2009 (A1)Risk Management - Conference 2009 (A1)
Risk Management - Conference 2009 (A1)
 
risk_assessment_presentation.pdf
risk_assessment_presentation.pdfrisk_assessment_presentation.pdf
risk_assessment_presentation.pdf
 
A5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_enA5 b1 risk assessement_suzanne gibson_en
A5 b1 risk assessement_suzanne gibson_en
 
risk assessment
risk assessmentrisk assessment
risk assessment
 
Debunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety RiskDebunking the Myths about Health and Safety Risk
Debunking the Myths about Health and Safety Risk
 
2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx2-iosh_powerpoint-ra-back-to-basics.pptx
2-iosh_powerpoint-ra-back-to-basics.pptx
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
 
Module 15 - Risk Management.pptx
Module 15 - Risk Management.pptxModule 15 - Risk Management.pptx
Module 15 - Risk Management.pptx
 
Risk Management.docx
Risk Management.docxRisk Management.docx
Risk Management.docx
 
Keeping children safe - standards iii
Keeping children safe - standards iiiKeeping children safe - standards iii
Keeping children safe - standards iii
 
CYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdfCYBOK: Risk Management Governance KA Webinar slides.pdf
CYBOK: Risk Management Governance KA Webinar slides.pdf
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Risk Assessment - Volunteer Engagement
Risk Assessment - Volunteer EngagementRisk Assessment - Volunteer Engagement
Risk Assessment - Volunteer Engagement
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk assessment and compliance 151119
Risk assessment and compliance 151119Risk assessment and compliance 151119
Risk assessment and compliance 151119
 

More from JISC infoNet

Adding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveAdding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveJISC infoNet
 
Teaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingTeaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingJISC infoNet
 
Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! JISC infoNet
 
JISC Design Studio Overview
JISC Design Studio OverviewJISC Design Studio Overview
JISC Design Studio OverviewJISC infoNet
 
Embedding Business and Community Engagement
Embedding Business and Community EngagementEmbedding Business and Community Engagement
Embedding Business and Community EngagementJISC infoNet
 
The higher education academy associates bribery act training
The higher education academy associates bribery act trainingThe higher education academy associates bribery act training
The higher education academy associates bribery act trainingJISC infoNet
 
The Higher Education Academy Framework
The Higher Education Academy FrameworkThe Higher Education Academy Framework
The Higher Education Academy FrameworkJISC infoNet
 
Introduction to the Higher Education Academy
Introduction to the Higher Education AcademyIntroduction to the Higher Education Academy
Introduction to the Higher Education AcademyJISC infoNet
 
Handout for Mobile Learning Presentation
Handout for Mobile Learning PresentationHandout for Mobile Learning Presentation
Handout for Mobile Learning PresentationJISC infoNet
 
Implementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionImplementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionJISC infoNet
 
Mobile Learning infoKit
Mobile Learning infoKitMobile Learning infoKit
Mobile Learning infoKitJISC infoNet
 
2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1eJISC infoNet
 
Here's one I made earlier...
Here's one I made earlier...Here's one I made earlier...
Here's one I made earlier...JISC infoNet
 
What’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementWhat’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementJISC infoNet
 
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12JISC infoNet
 

More from JISC infoNet (15)

Adding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspectiveAdding value through BI: a Jisc perspective
Adding value through BI: a Jisc perspective
 
Teaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefingTeaching Development Grants: Reviewer briefing
Teaching Development Grants: Reviewer briefing
 
Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox! Getting your inbox under control: How to Master that inbox!
Getting your inbox under control: How to Master that inbox!
 
JISC Design Studio Overview
JISC Design Studio OverviewJISC Design Studio Overview
JISC Design Studio Overview
 
Embedding Business and Community Engagement
Embedding Business and Community EngagementEmbedding Business and Community Engagement
Embedding Business and Community Engagement
 
The higher education academy associates bribery act training
The higher education academy associates bribery act trainingThe higher education academy associates bribery act training
The higher education academy associates bribery act training
 
The Higher Education Academy Framework
The Higher Education Academy FrameworkThe Higher Education Academy Framework
The Higher Education Academy Framework
 
Introduction to the Higher Education Academy
Introduction to the Higher Education AcademyIntroduction to the Higher Education Academy
Introduction to the Higher Education Academy
 
Handout for Mobile Learning Presentation
Handout for Mobile Learning PresentationHandout for Mobile Learning Presentation
Handout for Mobile Learning Presentation
 
Implementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your InstitutionImplementing Mobile Learning in Your Institution
Implementing Mobile Learning in Your Institution
 
Mobile Learning infoKit
Mobile Learning infoKitMobile Learning infoKit
Mobile Learning infoKit
 
2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e2011 09 06 alt c pecha kucha d1e
2011 09 06 alt c pecha kucha d1e
 
Here's one I made earlier...
Here's one I made earlier...Here's one I made earlier...
Here's one I made earlier...
 
What’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information ManagementWhat’s in it for us? CERIF and Research Information Management
What’s in it for us? CERIF and Research Information Management
 
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
Elluminate Presentation - JISC Advance Management Team Meeting 2010 03 12
 

Recently uploaded

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 

Recently uploaded (20)

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 

E safety safeguarding and risk assessment

  • 1. Safeguarding and Risk Assessment in the learning and skills sector Phil Barnett LSIS Associate
  • 2. Aim Aim: To explore and apply a model of risk assessment to a safeguarding challenge
  • 3. Objectives • To consider specific situations that should be subject to a risk assessment process • To identify appropriate interventions that can be applied in order to mitigate against risk • To review current organisational practice and identify how these can be further improved
  • 4. Definitions Risk Management Risk management is a central part of any organisation’s strategic management. It is the process whereby organisations methodically address the risks attached to their activities with the goal of achieving sustained benefit within each activity and across the portfolio of all activities. The focus of a good risk management process is the identification and treatment of these risks. Source: Institute of Risk Management (IRM) Risk Management Standard
  • 5. Risk Assessment Who/what is at risk? Risk Assessment The workforce Learners The Organisation
  • 6. What is risk assessment? A risk assessment is simply a careful examination of what, in your organisations context, could cause harm. You can then decide whether you have taken enough precautions or should you do more to prevent harm. Adapted from the Health and Safety Executive (HSE) Risk Assessment Information sheet
  • 7. Definitions • Child or young person: up to their 18th birthday (UN convention of the Rights of the Child) • Vulnerable adult: a person who has attained the age of 18, and: • Is receiving any form of health care • Is receiving a service or participating in an activity which is specifically targeted at people with age-related needs, disabilities or prescribed physical or mental health conditions or expectant or nursing mothers living in residential care • Age-related needs includes needs associated with frailty, illness, disability or mental capacity For more details see Section 59 of Safeguarding Vulnerable Groups Act 2006.
  • 8. What are we safeguarding learners from?
  • 9. Safeguarding learners from • Sexual abuse or inappropriate relationships • Grooming • Physical and emotional abuse or neglect • Domestic violence • Inappropriate parenting • Inappropriate supervision by staff/volunteers i.e. ‘bad practice’ • Bullying, cyber-bullying • Self-harm, risky behaviour • Unsafe activities and environments
  • 10. • Accidents e.g. road, home • Crime • Fear of crime • Exploitation including financial abuse, sexual exploitation, forced marriage • Immigration issues • Potentially unsafe environments e.g. parks, sports grounds • Homelessness and unsuitable housing • Victimisation due to race, sexuality, faith, gender, disability and so on And…
  • 11. Identifying the potential safeguarding risks: Group Activity: With these definitions in mind and from your experience identify a range of safeguarding situations that are subject to a risk management and assessment process. These might apply to learners, staff, visitors, the organisation When the list is complete prioritise them to low, medium and high risk situations
  • 12. Safeguarding and Risk Assessment The following areas may be covered by your Risk Assessment process: • Trips • Work placements • Certain workshop/practical activity • Lone Working • Other Learners (where applicable) • Home visits • Mixed age groups within one learning cohort • Multiple sites • Travel between sites …………
  • 13. The Five Steps to a Safeguarding Risk Assessment STEP 1 STEP 2 STEP 3 STEP 4 STEP 5 Identify and detail the situation that could cause potential harm Decide who might be harmed and how Evaluate the risk and decide on precautions /interventions Record and report your findings and agreed actions Review your assessment and update if necessary
  • 14. Operational thinking for the identification of risks Likelihood of occurrence Certain 6 Likely 5 Probable 4 Possible 3 Remote 2 Improbable 1 Catastrophic 4 24 20 16 12 8 4 Critical 3 18 15 12 9 6 3 Marginal 2 12 10 8 6 4 2 Negligible 1 6 5 4 3 2 1 Impact of occurrence MediumLow High
  • 15. Deciding on the level of Risk 1-7 LOW 7-13 MEDIUM 13-24 HIGH Low - If risk lies in the low category no additional direct action is required to address the risk but it is worth identifying and recording so that everyone is aware and measures can be taken to reduce the risk should this become necessary. Medium - Risk in the medium category poses a significant risk and therefore countermeasures should be taken to reduce the likelihood of occurrence and/or significance. Contingencies should also be in place to deal with the risk should it occur. High - High risks pose a substantial risk and should be evaluated to decide whether they are tolerable or intolerable. If the risk is deemed tolerable then activity should only be started once measures have been taken to reduce the risk and satisfactory contingencies have been put in place to minimise the impact of the risk Source: Adapted from PRINCE2 risk management
  • 16. Case Study Activity Group presentations and feedback
  • 17. Dealing with the Risk Once a risk has been identified and analysed - What are the choices? • Avoidance (eliminate, withdraw from or not become involved) • Reduction (optimise - mitigate) • Sharing (transfer - outsource or insure) • Retention (accept and budget)
  • 18. Some examples of how a safeguarding risk can be mitigated Mitigation To appoint and train a lunchtime supervisory team To put in place escort arrangements with the security team Safeguarding awareness training for learners Emergency contact arrangements Risk 14-16 year olds lunch arrangements Staff member who needs to clear up after a restaurant session Apprentices in the workplace
  • 19. External inspection continued… Compliance or commitment? • The grade for safeguarding is a ‘limiting’ grade, which impacts on grades for Leadership and Management and Overall Effectiveness. • Compliance is the minimum necessary requirement for a judgement of ‘adequate’ in safeguarding • Staff Training – The LSIS Safeguarding Training Modules are recognised by OfSTED. It will be important for providers to select the modules best suited to staff roles and responsibilities. 19 © LSIS Sept 2010 Company no 06454450 Registered charity No 1123636 Registered office: Friars House, Manor House Drive, Coventry CV1 2TE
  • 20. Further LSIS Safeguarding Training • Safeguarding in the Learning and Skills Sector • Safer Staff Recruitment and Safeguarding • Safeguarding and Human Resource (HR) Practices and Procedures • Safeguarding and Inspection • Safeguarding Facilitator Workshop • Safeguarding Designated Person Workshop • In house and bespoke activities
  • 21. Session Evaluation • As a group reflect on the session and record the following: • 3 Low spots about the training • 3 High spots • 1 improvement • In addition record for yourself one aspect that you are going to take back to your workplace
  • 22. Contact Details: Learning and Skills Improvement Service, Friars House, Manor House Drive, Coventry. CV1 2TE. (02476) 627 745 safeguarding@lsis.org.uk