Here is what
you should do when using College computers and what happens when you misuse
- The College
computers are for educational use only.
- The network
should only be accessed by authorised users. All students are personally
responsible for their password protected accounts and anything that is done
within that account. Do not let anyone else use them.
- When using
the network, the VLE, e-mail and the Internet, students are expected to behave
as they would in any other place where they represent the school. Students must
conduct themselves in a responsible, ethical and polite manner.
should know that the College’s computers are College property so can be
inspected at any time. All activity such as e-mail is monitored at all times.
- Please only
send single copies to departmental printers and make sure that you collect them.
- All rules
apply whether access is gained in or out of College.
Students agree when logging onto the 5 e-safety Ts: Technology, Time, Take
Care, Tricky and Tell.
use of Network Services
- Users must
not try to break the security of the College’s computers, data or network
equipment or services.
- Any attempt
to vandalise these services will result in a loss of the student’s access to
these services. Repeated offences will result in longer loss of access.
- Vandalism is
any attempt to harm or destroy other students’ work, to access other students’
accounts or to damage any network service. This includes uploading and creating
- Using other
students’ accounts is forbidden.
- If you have
misused computer systems outside of College you may be denied access to College
bullying” is when someone is tormented, threatened, harassed, humiliated,
embarrassed or otherwise targeted by someone else through the internet,
interactive digital technologies and/or mobile phones. The College takes this very
seriously and will follow-up all incidents which are suspected as being
examples of “cyber bullying” with parents, even if the ICT system that is used
is not provided by the College.
- Laptops. We
are happy for you to bring your laptops into College for educational use. You
must however have up-to-date virus and spam protection and have permission from
either Thorpe Campus/Frinton Campus Head of ICT.
the spelling, writing or keyboarding of others.
- Play any
form of game(s) on the College’s computers or store games in their accounts.
passwords with others.
- Pass on
anyone else’s account name and password.
- Gain access to any parts of the college computer systems that they are not permitted to access.
- Reveal any
personal details without permission.
- Buy or sell
goods via the computer, e.g. eBay, Gumtree, Facebook
- Store MP3
music or video files in their accounts unless for a specific educational use.
- Use proxy
sites, VPNs or other such software or apps to avoid College security and internet safeguards.
- Use social
networking sites such as Facebook, Instagram, Twitter, Snapchat, WhatsApp etc.
- Post rude,
offensive, threatening or embarrassing text messages or videos to any College
site including any official TTC Facebook/Instagram sites/pages.
and Social Networking Sites
Please discuss with your parents the implications of
using social networking sites at home. You have no guarantee that the members
of the site are who they say they are. There are five clear risks:-
members can access your personal information if you do not set up the correct
restrictions are there to protect you, so do not ignore them.
- Your images
and text can be copied by others, can be stored permanently and can be
manipulated and misused.
- You may
break copyright laws.
- You may post
explicit or embarrassing images which may affect future job prospects.
applies to any medium. You must not reproduce or copy copyrighted protected
work such as text, images, music, video, etc., without the permission of the
author of that work.
We use classroom management software to monitor and safeguard our pupils and log what sites they access whilst using college computers or laptops.
breaches of the law
The police may be called in if any of these following
laws are broken.
duplicate, store or transmit pornographic material.
- Transmit or
post threatening, abusive, obscene or harassing material.
- Initiate or
pass-on chain mail or SPAM to cause harassment to other users.
- Use abusive,
vulgar, obscene, harassing or other inappropriate language.
store or transmit copyrighted material violating copyright law.
incidents will be recorded permanently on SIMS.
(Reviewed November 2016 - G Byford)