ICT Facilities and Acceptable Use Policy
As well as being a taught as a subject, ICT is integrated into all curriculum areas and is viewed as essential to the future success of all our learners. We have invested heavily in ensuring the ICT facilities are kept up-to-date, reflect practice in the workplace and help support teaching and learning in the classroom.
All our classrooms contain ICT facilities. These are upgraded on a rolling programme and are all connected to the same network providing specialist software to all areas of the school. As well as the specialist software, Microsoft Office is used and taught so every learner is familiar with the usage of industry-standard software. There are over 50 PCs on the curriculum network, all running Windows 10
iPads/cameras and video recorders
Sets of devices are available for class teachers to book and use. They offer specialist Apps as well as cameras and internet use.
In the Classroom
Every single classroom in school is fitted with a digital projector allowing teachers to use a wide-range of learning material to every single learner, not just a few. Most classrooms also contain Interactive Smartboards which take the integration with the digital and classrooms worlds even closer.
Acceptable Use Policy
All pupils use computer facilities including Internet access as an essential part of learning, as required by the National Curriculum. When signing onto computers, the agreement below is show and learners have to accept to say the rules have been understood and agreed.
These e-safety rules help to protect learners and the school by describing acceptable and unacceptable computer use.
Acceptable Use Agreement: Learners
The school uses e-safe global to protect our learners and staff against safeguarding risks early so that intervention can be fast. This system monitors the use of the school’s computer systems, including access to web-sites, the interception of e-mail and the deletion of inappropriate materials where it believes unauthorised use of the school’s computer system may be taking place, or the system may be being used for criminal purposes or for storing unauthorised or unlawful text, imagery or sound