You'll probably have some questions about the eSafe service. Here are some of the things that we're usually asked:

Any more questions?

Ask us here

The secure eSafe application is installed on your computer devices, in the cloud (Google Chrome), or on your controlling servers (eg. thin client and virtual desktop environments).  

Our Behaviour Analysts have a high level degree in Child Psychology, Criminology, Forensic Science or Computing Forensics. They are experienced in supporting victims of a variety of behaviour-related situations (e.g. bullying and harassment, grooming, child abuse, mental health, offender management). They are also incredibly passionate about safeguarding and keeping children safe in education.

Our training programme is extensive and ongoing to ensure they are always up-to-date with the latest protocols and regulations. 

All our Behaviour Analysts are DBS checked and vetted to minimum NPPV (Non-Police Personnel Vetting) Level 3, with some holding enhanced security clearance.

When the application alerts the eSafe team to potentially harmful or risky behaviour, we follow this procedure:

  • A screen shot captures the incident
  • We record the user ID, machine name, time, date and IP address
  • Our Behaviour Analysts review the incident to determine if it requires intervention (or not)
  • Illegal and life-threatening incidents will be reported to you immediately, by phone
  • Incidents that require intervention are documented in an encrypted report that’s emailed to your nominated contacts
  • If intervention is required, the incident is escalated to your DSL, SLT or establishment leader, according to severity and the agreed protocol
  • Written and verbal correspondence is reserved only for incidents that require intervention
  • This correspondence will preserve the user’s anonymity, stating only the user ID, machine ID, time and date, a narrative of the incident and reason for escalation.   


Each user is allocated a unique ID to aid granular monitoring and reporting. Although we preserve the user’s anonymity in all our correspondence concerning an incident, clients are able to use the user ID, machine name, time and date stamp and IP address to identify the student from their own records. 

Of course. When we meet with you we’re very happy to share an anonymised report that will demonstrate how incidents are reported.  To arrange a meeting, please click here.

All the data we process and exchange is safe and secure, so your reputation is always protected from the risk of cyber breaches.

  • Our monitoring team is located in a physically secure laboratory environment, in the UK
  • Professionalism and confidentiality is a fundamental requirement of all eSafe employees.  There are processes and procedures in place to ensure compliance with this requirement.
  • The data we capture is protected at all times (during transmission between device and server, and at rest)
  • All data transmitted between school devices and the eSafe server is encrypted (256 AES)
  • eSafe servers are located behind a secure firewall at a UK-based ISO 27001 accredited data centre. Access is password controlled
  • Data is validated upon receipt to prevent code insertion attacks
  • Database access is password protected. While ‘at rest,’ the database is encrypted to provide a further level of obfuscation


If there are any school specific words and phrases you would like us to monitor for, simply tell your Relationship Manager and we will add them in.  The latest Threat Libraries are downloaded automatically to the eSafe software on your devices. We do everything for you so it’s a completely seamless and hassle-free way to maintain detection accuracy.