SUPPORTING VULNERABLE PUPILS Sample Clauses

SUPPORTING VULNERABLE PUPILS. 18 9. FINANCIAL SERVICES 43
AutoNDA by SimpleDocs
SUPPORTING VULNERABLE PUPILS. ‌ 5.1 ATTENDANCE‌ Schools and the LA will agree to set and monitor attendance targets in order to meet national benchmarking targets. • Implement a consistent and common set of attendance procedures . • Monitor and analyse attendance rates relevant data and information shared with schools • Prepare an annual attendance self- evaluation review with each school. • Prepare an action plan for schools with attendance in FSM benchmarking Quartiles 3 and 4 and for those schools who are not implementing consistent attendance procedures. • Prepare half termly attendance reports for Primary Schools highlighting pupils with attendance issues and ongoing cases. • Prepare minutes of weekly attendance meetings with secondary schools highlighting pupils with attendance issues and ongoing cases. • Receive all referrals for investigation in accordance with the LA’s Education Inclusion Service’s criteria for referral. • Visit schools (Education Inclusion Officers) regularly to provide advice and guidance on improving attendance and related issues. • Implement a consistent and common set of attendance procedures. • Maintain a complete and accurate register of all enrolled pupils (the school register is a legal document and it is the Headteacher’s responsibility to ensure its completion and accuracy.) • Record the attendance of all pupils on the register. Every morning and afternoon session must be recorded during term time using the electronic system. • Headteachers to check the electronic registers at the end of every week to ensure that there are ‘no missing marks’ or N marks. • Regular monitoring of registers and noting pupils with attendance rates below 95%. Following the appropriate procedures and sharing the information with the Education Inclusion Service. • Respond to half termly attendance reports within 10 working days (primary schools only). • Return attendance rates to the LA electronically in accordance with WG guidelines • Headteachers to agree total absenteeism targets with their school governing body annually. • Headteachers to review and monitor attendance rates every half term and take action when necessary. • Implement the annual attendance self-evaluation review and implement any action plan that might arise from the self-evaluation. Attendance Strategy and Attendance Policy Template for Schools 5.2 BEHAVIOUR‌ • Work towards improving educational attainment by decreasing the number of days lost through exclusions by working in • Observe WG recommendations...
SUPPORTING VULNERABLE PUPILS 

Related to SUPPORTING VULNERABLE PUPILS

  • Supporting Information Each Franchise Fee payment shall be accompanied by a brief report prepared by a representative of Franchisee showing the basis for the computation.

  • Software Inclusions Restrictions

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Escorting Visitors Visitors to areas where PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY is 5 contained shall be escorted and such PHI shall be kept out of sight while visitors are in the area.

  • Unbundled Voice Loops (UVLs) 2.2.1 BellSouth shall make available the following UVLs:

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!