20.08.2013 Views

TTC SIXTH FORM - Tendring Technology College

TTC SIXTH FORM - Tendring Technology College

TTC SIXTH FORM - Tendring Technology College

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

learning, homework, assessment, catering and the college environment. Tutor groups have the<br />

opportunity to discuss relevant issues with representatives and these discussions formulate the<br />

responses and ideas to be put on the agenda and discussed at the full Council meeting.<br />

Meetings are always attended by the Sixth Form Programme Director - GCE (and possibly a member of<br />

the Senior Leadership Team if appropriate), whilst an SSM acts as Secretary.<br />

Sensitive comments can be made in meetings in the strictest confidence, and at the same time meetings<br />

should be informative and enjoyable. All meetings aim to bring students’ ideas and opinions to the fore,<br />

enabling them to feel ownership and have an input on certain issues or initiatives. Meetings also act as a<br />

useful tool for Sixth Form management when considering education, standards and student well-being.<br />

It is the responsibility of the Sixth Form Programme Director – GCE to facilitate, respond to, and report on<br />

progress made as a result of, Council meetings. With the exception of sensitive issues or those of<br />

ongoing investigation, the Council remains as transparent as possible, and therefore will publicly outline<br />

the progress that has been made with any issues that have been raised by the student representatives<br />

where appropriate.<br />

26. ICT<br />

<strong>TTC</strong> Acceptable Use Policy for Computers and the Internet.<br />

<strong>TTC</strong> provides every student with access to our computer network for educational purposes. Electronic<br />

information is often much more current, less expensive, and easier to access than conventional sources.<br />

The primary purpose of the access to our computer network is to enhance student learning in school.<br />

At the same time, there are potential hazards. While you should make every effort to avoid misuse of the<br />

Computers and Internet services, you may send/receive offensive communications and may access<br />

material which is not appropriate. As with other methods of communication, there are opportunities with<br />

computer networks for you to create and distribute inappropriate materials and to conduct yourselves in<br />

ways that are unacceptable.<br />

At <strong>TTC</strong> we have rigorous filtering systems already in place but we cannot guarantee that every single<br />

inappropriate internet site can not be accessed. It is up to you to inform us immediately if you<br />

accidentally access such a site so it can be blocked. If we discover that such a site has been accessed<br />

on more than one occasion without referral we will take this very seriously. If there is evidence that a link<br />

to such sites or material from such sites has been saved then we will pass this onto the Principal to<br />

decide if this should be referred to the police<br />

In response to the growing use of the Internet the <strong>College</strong> has decided to implement an Acceptable Use<br />

Policy (AUP) to ensure that <strong>College</strong> computers are being used in a safe, relevant and appropriate<br />

manner. This has been provided to:<br />

• advise you that any inappropriate use by you will result in appropriate disciplinary action by the<br />

school<br />

• provide you with guidelines as to the correct use of computers so you can assist us in enforcing<br />

it.<br />

Computer and Internet Acceptable Use Policy<br />

Following is a list of guidelines and a list of specific behaviours that may lead to disciplinary action under<br />

the <strong>TTC</strong> Computer Code of Conduct, and/or suspension or limitation of network access privileges:<br />

1. The college’s computer networks are intended only for educational purposes only.<br />

2 Network services, and access to these services, shall only be used by authorized persons. Where<br />

password-protected accounts are used, network users are personally responsible for all activity that<br />

occurs within their account.<br />

James Saunders Page 15 31/08/12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!