Eden Training Solutions

Safeguarding Policy

The purpose of this policy is to support the actions and priorities as set out in the Safeguarding Strategy which outlines Eden Training Solutions desire and commitment in promoting positive practices throughout the organisation.

The Policy

The Safeguarding Vulnerable Group’s Act 2006 and The Care Act 2014 provides the legislation for:
Providing a vetting and barring scheme for those working with children and vulnerable adults.

The Keeping Children Safe in Education 2021 lays the legislation for:

  • Protecting children from maltreatment;

  • Preventing the impairment of children’s mental and physical health or development;

  • Ensuring that children grow up in circumstances consistent with the provision of safe and effective care;

  • Taking action to enable all children to have the best outcomes.

    As a provider of training, we need to ensure all reasonable steps are taken to ensure unsuitable people are prevented from working with our learner/apprentices/apprentices. Eden Training Solutions will take all reasonable steps to ensure that no person will be recruited to a position involving duties set out in the Education Act 2011; this includes posts where the normal duties, including training, supervising or being in sole charge of children or vulnerable adults.

    Our staff could be working alongside Vulnerable Adults which could include any employees, learner/apprentices/apprentices, and employers, including contractors undertaking work on our behalf.

    Definitions of Vulnerable Adults

    The Safeguarding Vulnerable Groups Act 2006 (section 59) defines a vulnerable adult as an adult who:

  • Receiving a social care service

  • Receiving a health service

  • Living in sheltered accommodation

  • Detained in custody or under probation

  • Requiring assistance in the conduct of his / her affairs

    As listed above, vulnerable adults may need care services by reason of mental or other disability, age or illness and who may be unable to take care of themselves or unable to protect themselves against significant harm or exploitation.

    Our learner/apprentices/apprentices, who are vulnerable adults, are therefore entitled to protection against abuse, including all forms of harm or exploitation.

    Eden Training Solutions is committed to protecting our learner/apprentices/apprentices against all forms of abuse. All employees of the organisation have a responsibility toward our service users to ensure that, as vulnerable adults, they are protected from abuse.

Abuse is a violation of a service user’s human and civil rights by another person and may consist of a single act or multiple acts. As well as physical and psychological abuse, acts of neglect or an omission to act, may amount to abuse. Abuse may also occur when a vulnerable adult is persuaded to enter into a financial or sexual transaction to which he or she has not consented or cannot consent.

When dealing with our learner/apprentices, Eden Training Solutions employees must remain vigilant at all times of the risk to our learner/apprentices from abusive behaviour from different sources including members of the learner/apprentice’s family, other learner/apprentices, employees and in different situations.

If an employee believes a learner/apprentice has been subjected to abuse, he or she should refer the circumstances to his or her line manager (or another manager if appropriate).

If the alleged perpetrator of abuse is another employee, the circumstances will be investigated fully under the Disciplinary Procedure.

If necessary, Eden Training Solutions will refer details of the circumstances to the Secretary of State so that details of the alleged perpetrator may be reported on a provisional basis to the Independent Safeguarding Authority (ISA), pending the outcome of disciplinary procedures. Upon full investigation, should the allegations be shown to be clearly groundless, Eden Training Solutions will act promptly to have the employee’s name removed from provisional ISA report. If, following full investigation of the circumstances, Eden Training Solutions determines that the perpetrator should be dismissed, the employee’s details will be referred to the ISA.

Keeping Children Safe in Education (KCSE) September 2021

All Eden Training Solutions staff are made aware of the requirements of the KCSE at induction as part of the Job Ladder process and undertake all necessary training required around the promotion of the policy with learner/apprentices/apprentices and employers, how to recognise potential signs of abuse and the reporting mechanisms available to support the process.

Definitions of Abuse

It is not the responsibility of anyone from Eden Training Solutions to decide whether someone has been abused. It is however everyone’s responsibility to report concerns. It is very important that our employees understand what is meant by the term ‘abuse’. The different types of abuse are:

  • Emotional Abuse

  • Neglect

  • Physical Abuse

  • Sexual Abuse

  • Negative Discrimination (including racism)

  • Bullying (includes bullying by gangs; bullying by family members; physical bullying; verbal bullying; teasing;

    and physical and sexual harassment and violence)

    The above includes both face to face and online social media/e-safety. In all cases of suspected or alleged abuse, advice and guidance must first be sought from the local Social Work Department and/or Local Authority Designated Officer (LADO) or the Police

The Prevent Strategy

The main aim of the strategy is to:

  • Respond to the ideological challenge we face from terrorism and aspects of extremism, and the threat we face from those who promote these views;

  • Provides practical help to prevent people from being drawn into terrorism and ensure they are given appropriate advice and support;

  • Works with a wide range of sectors (including education, criminal justice, faith, charities, online and health) where there are risks of radicalisation that we need to deal with.

    The strategy covers all forms of terrorism, including far right extremism and some aspects of non-violent extremism. The Home Office works with local authorities, a wide range of government departments, and community organisations to deliver the Prevent strategy. The police also play a significant role in Prevent, in much the same way as they do when taking a preventative approach to other crimes.

    The Home Offices uses a range of measures to challenge extremism in the UK, including:

  • Where necessary, preventing apologists for terrorism and extremism from travelling to this country

  • Giving guidance to local authorities and institutions to understand the threat from extremism and the

    statutory powers available to them to challenge extremist speakers

  • Funding a specialist police unit which works to remove online content that breaches terrorist legislation

  • Supporting community-based campaigns and activity which can effectively rebut terrorist and extremist

    propaganda and offer alternative views to our most vulnerable target audiences – in this context they work

    with a range of civil society organisations

  • Supporting people who are at risk of being drawn into terrorist activity through the Channel process, which

    involves several agencies working together to give individuals access to services such as health and education, specialist mentoring and diversionary activities.

    Eden Training Solutions is committed to supporting vulnerable learner/apprentices/apprentices through its safeguarding agenda in order to prevent potential radicalisation. Please see separate Prevent Policy for the necessary amplification of the above.

    Working Safely On-line


    What is cyberbullying? Cyberbullying involves the use of electronic communication devices to bully people. These include: mobile phones, tablets, iPods, laptops and PCs. Social media platforms such as Facebook, Instagram, Twitter and WhatsApp are used by cyberbullies to put out their communications.

    IT equipment provided to both staff and learners is subject to monitoring. In addition to monitoring filters are applied to Eden Training Solutions systems which will restrict access to harmful content. This will be overseen by the Director of Systems.

Who is most at risk?

Children using social media unsupervised and vulnerable adults are particularly at risk if they are using social media, as they may be more emotionally and mentally susceptible to the abuse.

Examples of Cyberbullying

  • Flaming – Online fights usually through emails, instant messaging or chat rooms where angry and rude comments are exchanged

  • Denigration – Putting mean online messages through email, instant messaging, chat rooms, or websites set up to make fun of someone

  • Exclusion – Intentionally leaving someone out of a group such as instant messaging, friend sites, or other online group activities

  • Outing – Sharing secrets about someone online including private information, pictures, and videos

  • Impersonation – Tricking someone into revealing personal information then sharing it with others

  • Harassment – Repeatedly sending malicious messages to someone online

  • Cyberstalking – Continuously harassing and denigration including threats of physical harm


    What does the term grooming mean? Grooming is a word used to describe people befriending children and vulnerable adults to take advantage of them for sexual preferences. Grooming is also used by extremist groups to radicalise individuals in to supporting and potentially committing terrorist attacks.

    What is sexual online grooming? Sexual online grooming is when people form relationships with children pretending to be their friend, using social media platforms to do so the person carrying out the online grooming will try to establish the likelihood of the child telling someone. They will also find out as much as they can on the child’s family and social networks.

    Online groomers will tend to use chatrooms, which are focussed on young people. There are countless teen chat rooms on the internet. Those carrying out the grooming will pretend to be a child themselves, similar in age to the person they are grooming. They will even change their gender to make it easier to befriend the person they are grooming.

    Grooming online is anonymous and children find it easier to trust an online ‘friend’ than someone they have met ‘face to face’.

    Online Grooming
    How do you know if a child/vulnerable adult is being groomed online?

  • Wanting to spend more and more time on the internet

  • Being secretive about who they are talking to online and what sites they visit

  • Switching screens when you come near the computer

  • Possessing items – electronic devices or phones – you haven’t given them

  • Using sexual language, you wouldn’t expect them to know

  • Becoming emotionally volatile

    Grooming – In Person

  •   Consensual and non-consensual sharing of nude and semi-nude images and/or videos (also known as sexting or youth produced sexual imagery);

  •   Upskirting, which typically involves taking a picture under a person’s clothing without their permission, with the intention of viewing their genitals or buttocks to obtain sexual gratification, or cause the victim humiliation, distress or alarm; and

  •   Initiation/hazing type violence and rituals (this could include activities involving harassment, abuse or humiliation used as a way of initiating a person into a group and may also include an online element).

    Child criminal exploitation (CCE)

    Child criminal exploitation is complex and takes a variety of forms. In general, child exploitation occurs where an individual or group takes advantage of a power imbalance to coerce, control, manipulate or deceive a child or young person under the age of 18 into criminal or sexual activity or modern slavery. This can be in exchange for something the victim needs or wants, this is most likely to be the result of grooming, where a criminal has identified what a young person may want or need.

    The power imbalance can be through a range of factors, including age, gender, cognitive ability, status, and access to economic or other resources. A young person may also experience poor mental health, have experienced bereavement or are being bullied which may make them more likely to be vulnerable to exploitation.
    The victim may have been exploited even if the activity appears consensual, and exploitation does not always involve physical contact; it can also occur through technology.

    CCE activity can include children being coerced into moving drugs or money across the country, forced to shoplift or pickpocket, or to threaten other young people. One of the most common types of CCE activity is called county lines. This involves organised drug dealing networks that exploit children and vulnerable adults to move, hold and sell drugs across the UK using dedicated phone lines to take orders. Exploitation is a key component of the business model and gangs use children because they are cheaper, more easily controlled and less likely to get picked up by the police.

    Children can be exploited as ‘runners’ (transporting drugs) but they may also undertake other roles such as cutting and bagging drugs, collecting debts or experience the ‘cuckooing’ of properties. Cuckooing involves taking over the home of a vulnerable person in a supply area to use it as a base for drug dealing.

    Exploitation can affect any child but there are some children who may be at greater risk than others:

  • Children in care – these children may be particularly vulnerable because of the situations and experiences that led to them to being brought into care.

  • Children who have been excluded from school or are in alternative provision– young people may feel disenfranchised which can make them an easy target for perpetrators.

  • Children living in poverty – who may be groomed through offers of material possessions or for money for themselves or their family due to financial concerns.

  • Children with educational needs – this may be due to increased vulnerabilities but also due to not recognising exploitation, or not being able to access support.

  • Children who are not UK citizens or do not have immigration status – the precariousness of their immigration status is an additional vulnerability that enables gangs to target them.

  • Family connection – some children have family members who are involved in criminal activity and therefore fall into exploitation through running errands to support their family.

  • Young people not already known to authorities – who may be from affluent backgrounds and not deemed as ‘vulnerable’. These groups often fall under the radar and less likely to attract attention from authorities.

  • Children with poor mental health and wellbeing – children and young people with poor emotional wellbeing, low esteem, have experienced bereavement or are being bullied are also more likely to be vulnerable.

  • Children in proximity to an exploiter – children and young people who have none of the above factors but are in proximity to someone who is seeking to exploit children.

    Awareness raising and promotion to Staff, Learner/apprentices and Employer

    To safeguard and educate our staff, learner/apprentices and employers (and other stakeholders) the following activities are employed as part of the Steps to Success process throughout our programmes:

  • A clear and effective Safeguarding Policy is available;

  • A clear induction process for staff – Job Ladder;

  • Promotion of said Policy through the Apprenticeship and Employer Onboarding;

  • Promotion of the Policy through the website;

  • Monthly Hot Topics promoted to learner/apprentices/apprentices and employers via e-mail and Social


  • Learning resources attached to learner/apprentices/apprentices Personal Learning Plan;

  • Promoted via the Learner/apprentice Review process;

  • Discussed as part of KIT days, OTLA periods and via standardisation activities;

  • Review, monitor and update all IT systems and technologies against illegal access and use;

  • Record and track instances of learner/apprentice and employee absences;

  • Mandatory training for all staff.

    Implementation and Checks

    Disclosure and Barring Services checks will be obtained and subsequently completed with all employees or contractors. Enhanced Disclosures will be requested for all positions, permanent or temporary for learner/apprentice facing employees or contractors.

    All organisations and training providers are required to have a designated member of staff, who is assigned to act upon child and vulnerable adult protection concerns.

    This person is called the Designated Safeguarding Officer (DSO) and they are responsible for co-ordinating action within Eden Training Solutions and liaising with other agencies.

    The DSO is required to know:

  • How to identify the signs and symptoms of abuse/radicalisation and when to make a referral

  • The local Child and Vulnerable Adult protection procedures and the DSOs role within them

  • The role and responsibilities of the investigating agencies and how to liaise with them

  • The requirements of record keeping

  • The conduct of a child protection conference and how the DSO or other members of staff can make an appropriate contribution to it.

    For the purposes of the Prevent Duty Eden Training Solutions DSO will also liaise with the appropriate agencies locally around any issues with extremism and/or radicalisation.

Training and Communication

The policy is available to all employees, learner/apprentices and contractors through induction and updates including midpoint and exit IAG procedure. The policy also applies to all employees and contractors, undertaking work on our behalf.

We will:

  • Ensure the reporting process is clear and transparent with clear lines of communication and documentation.

  • Ensure all personal data will be processed in accordance with the requirements of the General Data

    Protection Regulation 2018.

  • Require staff to adopt and abide by this Policy and these Procedures.

  • Have documented procedures in place to record or conduct appropriate actions when concerns are


  • Respond to any allegations of misconduct or abuse in line with this policy

  • Review and evaluate this policy on a regular basis.

  • Complete employee checks to ensure all team members are authorised to work with vulnerable adults

  • Signpost learners/apprentices to support/referral agencies

    Reporting process
    See attached flowchart Review

    The policy will be regularly monitored and reviewed, in accordance with changes in legislation and guidance, following any issues or concerns raised regarding safeguarding and or Prevent matters and in all other circumstances.


    Lorna Newbould
    Chief Executive Officer

    The policy will be regularly monitored and reviewed annually next review September 2022, in accordance with changes in legislation and guidance