Acceptable and Unacceptable Uses Sample Clauses

Acceptable and Unacceptable Uses. The computers, computer network and messaging systems of the School District are intended for educational uses and work-related communications. Incidental use of the e-mail and voice mail systems by staff members for personal communications is permitted as long as such communications are limited in number, are initiated during non-work periods, and do not interfere with the primary intended uses of the system. The following are uses that are unacceptable under any circumstances:  the transmission of any language or images which are of a graphic sexual nature  the transmission of jokes, pictures, or other materials which are obscene, lewd, vulgar, or disparaging of persons based on their race, color, sex, age, religion, national origin, or sexual orientation  the transmission of messages or any other content which would be perceived by a reasonable person to be harassing or threatening  uses that constitute defamation (libel or slander)  uses that violate copyright laws  uses that attempt to gain unauthorized access to another computer system or to impair the operation of another computer system (for example, the transmission of a computer virus or an excessively large e-mail attachment)  any commercial or profit-making activities  any fundraising activities, unless specifically authorized by an administrator Staff members shall not take any action that would compromise the security of any computer, network or messaging system. This would include the unauthorized release or sharing of passwords and the intentional disabling of any security features of the system. Staff members shall not take any actions that may adversely affect the integrity, functionality, or reliability of any computer (for example, the installation of hardware or software not authorized by the System Administrator). Staff members shall report to the System Administrator or a School District administrator any actions by students which would violate the security or integrity of any computer, network or messaging system whenever such actions become known to them in the normal course of their work duties. This shall not be construed as creating any liability for staff members for the computer-related misconduct of students. Although the Board of Education respects the natural desire of all persons for privacy in their personal communications, and will attempt to preserve this privacy whenever possible, the operational and security needs of the District’s computer network and messagi...
AutoNDA by SimpleDocs
Acceptable and Unacceptable Uses. Your use of the AnyLogic Software and Models (as defined in the AnyLogic End User Agreement) is limited. This document presents acceptable and unacceptable uses of the AnyLogic Software. If you are not sure whether your use or desired exploitation of the Models is allowed by AnyLogic, you should assume the use or exploitation is unacceptable. In such circumstances, please contact AnyLogic directly.
Acceptable and Unacceptable Uses. 4.1. Mobile phones must being used in accordance with the above mobile phone agreement. Using features of the phone such as audio recording, taking pictures or video, listening to music, and such constitutes “using a mobile phone”. 4.2. Parents are reminded that in cases of emergency, the College office remains a vital and appropriate point of contact and can ensure your child is reached quickly and assisted in any appropriate way. 4.3. Mobile phones should not be used in any manner or place that is disruptive to the normal routine of the College. 4.4. Mobile phones must not disrupt others. 4.5. Using mobile phones to bully and threaten other students is unacceptable and will not be tolerated. In some cases it can constitute criminal behaviour. 4.6. It is forbidden for students to use their mobile phones to take videos and pictures or make audio recordings of acts to denigrate and humiliate that person and then send the pictures to others or upload it to a website for public viewing. This also includes using mobile phones to photograph or film any person without their consent. It is a criminal offence to use a mobile phone to menace, harass or offend another person and almost all calls, text messages and emails can be traced.
Acceptable and Unacceptable Uses. A. It is acceptable for the MASD telecommunication systems, including the Intranet and Internet, to be used for educational purposes. B. MASD telecommunications systems are of great importance and require the cooperation and diligence of all users. It is acceptable and expected that any user who identifies a security problem must notify the site administrator (principal or director) who must then notify the Superintendent's designee. The user shall not demonstrate the problem to others. Any user who attempts or causes a breach of the system security shall have his/her privileges revoked and may be subject to any additional disciplinary and/or legal action. C. It is unacceptable to use MASD telecommunications to: 1. post or repost private, personally identifiable information about another person without permission (including, but not limited to, home address, telephone numbers, identification numbers, account numbers, access codes or passwords, photographs, height, weight); 2. send threatening or harassing messages; 3. make or transmit false, defamatory, or libelous statements about another person, group, or organization; 4. access or share pornographic, sexually explicit, obscene, or otherwise harmful or inappropriate materials; 5. gain or attempt to gain unauthorized access to MASD telecommunication systems; 6. interfere with the daily operation of MASD telecommunication systems, including knowingly placing computer malware on or within any telecommunication system; 7. access or attempt to access another person's account or files without prior implied or direct consent of that person; 8. intercept communications intended for another person without prior authorization; 9. engage in any commercial or fundraising purpose without authorization from the appropriate school district official; 10. further any political or religious purpose; 11. engage in any illegal act or violate any local, state, or federal statute or law; 12. download, upload, or distribute any files, software, or other material in violation of fair-use and copyright laws or intellectual property laws; 13. violate software usage or licensing agreements; 14. offer or provide goods or services or for product advertisement or to purchase goods or services for personal use. 15. maintain MASD application passwords that are less than eight (8) characters long with at least one (1) alphabetic and at least one (1) numeric character. 16. use electronic mail for confidential matters or privileged commun...
Acceptable and Unacceptable Uses. Use of the District’s computer and technology systems (on site and remote) and resources is a privilege, not a right. Inappropriate use of these systems and resources may result in a revocation of that privilege. The District, including its administration, teachers or representatives, will determine what constitutes inappropriate use and that decision will be final. In exchange for the privilege of accessing and using the District’s resources, the student understands and agrees that the following uses are unacceptable under any circumstances:
Acceptable and Unacceptable Uses. 4.1. Mobile phones should not be seen or heard on the College grounds or its immediate surroundings. Students may use the phone only in the privacy of their own room and dormitory. Students are not to congregate near the entrance to use a mobile phone. Using features of the phone such as audio recording, taking pictures or video, listening to music, and such constitutes “using a mobile phone”. 4.2. Parents are reminded that in cases of emergency, the College office remains a vital and appropriate point of contact and can ensure your child is reached quickly and assisted in any appropriate way. 4.3. Mobile phones should not be used in any manner or place that is disruptive to the normal routine of the College. 4.4. Mobile phones must not disrupt others. 4.5. Using mobile phones to bully and threaten other students is unacceptable and will not be tolerated. In some cases it can constitute criminal behaviour. 4.6. It is forbidden for students to use their mobile phones to take videos and pictures or make audio recordings of acts to denigrate and humiliate that person and then send the pictures to others or upload it to a website for public viewing. This also includes using mobile phones to photograph or film any person without their consent. It is a criminal offence to use a mobile phone to menace, harass or offend another person and almost all calls, text messages and emails can be traced.
Acceptable and Unacceptable Uses. The District is providing access to its computer networks and the Internet for educational purposes only. If you have any doubt about whether a contemplated activity is educational, you may consult with the person(s) designated by the school to help you decide.
AutoNDA by SimpleDocs
Acceptable and Unacceptable Uses. St. Xxxxx is providing access to our computer networks and the Internet for educational purposes only. Please consult the supervising teacher for questions on the educational value of an online activity.

Related to Acceptable and Unacceptable Uses

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Unacceptable Use I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: • Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Activity which defames or disparages the school, or risks bringing the school into disrepute • Causing intentional damage to ICT facilities or materials • Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Acceptable Use Policy The Services must be used in accordance with RingCentral’s Acceptable Use Policy, available at xxxxx://xxx.xxxxxxxxxxx.xxx/legal/acceptable-use-policy.html. Notwithstanding anything to the contrary in this Agreement, RingCentral may act immediately and without notice to suspend or limit the Services if RingCentral reasonably suspects fraudulent or illegal activity in the Customer’s Account, material breach of the Acceptable Use Policy, or use of the Services that could interfere with the functioning of the RingCentral Network provided such suspension or limitation may only be to the extent reasonably necessary to protect against the applicable condition, activity, or use. RingCentral will promptly remove the suspension or limitation as soon as the condition, activity or use is resolved and mitigated in full. If Customer anticipates legitimate but unusual activity on its Account, Customer should contact Customer Care in advance to avoid any Service disruption.

  • Pending Charges and Proposed Exclusions If Xxxxxx has actual notice that a Covered Person is charged with a criminal offense that falls within the scope of 42 U.S.C. §§ 1320a-7(a), 1320a-7(b)(1)-(3), or is proposed for exclusion during the Covered Person’s employment or contract term, Xxxxxx shall take all appropriate actions to ensure that the responsibilities of that Covered Person have not and shall not adversely affect the quality of care rendered to any beneficiary or the accuracy of any claims submitted to any Federal health care program.‌

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Right to Refuse Dangerous Work An employee shall have the right to refuse to work in dangerous situations.

  • Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.

  • Related Exclusions This agreement does NOT cover custodial care, respite care, day care, or care in a facility that is not approved by us. See

  • Retainage for Unacceptable Corrective Action Plan or Plan Failure If the corrective action plan is unacceptable to the Department or Customer, or implementation of the plan fails to remedy the performance deficiencies, the Department or Customer will retain ten percent (10%) of the total invoice amount. The retainage will be withheld until the Contractor resolves the performance deficiencies. If the performance deficiencies are resolved, the Contractor may invoice the Department or Customer for the retained amount. If the Contractor fails to resolve the performance deficiencies, the retained amount will be forfeited to compensate the Department or Customer for the performance deficiencies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!