Acceptable Computer and Internet Use Sample Clauses

Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or guardian permission is sought to give the student(s) access to the internet, based upon the policy contained within Information and Communication Technology (ICT) Procedure. xxxx://xxx.xxx.xxx.xxx.xx/xxxx/xxx/xxxxxxxxxx/Xxxxxxxxx%00Xxxxxxxxxxx/Xxxxxxxxxxx%00Xxxxxxxxxxxxx%00xxx %20Technology/advice.DOCX Communication through internet and online communication services must comply with the Responsible Behaviour Plan available on the school website. Note: Use of internet and online communication services can be audited and traced to the account of the user.
AutoNDA by SimpleDocs
Acceptable Computer and Internet Use. 4.1 Students are not to create, participate in, or circulate content that attempts to undermine, hack into and/or bypass the hardware and software security mechanisms that are in place.
Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or caregiver permission is sought to give the student(s) access to the Internet, based upon the policy contained within ICT-PR-004 Using the Department’s Corporate ICT Network. This policy also forms part of this Student BYOx Agreement and Charter; and the school’s Acceptable Use of IT and Internet Policy. The acceptable-use conditions apply to the use of the device and Internet both on and off the school grounds. Communication through Internet and online communication services must comply with the Responsible Behaviour Plan/ Student Code of Conduct which is available on the school website. There are a few conditions that students should adhere to. Students should not: • create, participate in or circulate content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place • disable settings for virus protection, spam and/or Internet filtering that have been applied as part of the school standard • use unauthorised programs and intentionally download unauthorised software, graphics or music • intentionally damage or disable computers, computer systems or Queensland DET networks • use the device for unauthorised commercial activities, political lobbying, online gambling or any unlawful purpose. Note: Students’ use of Internet and online communication services can be audited and traced to the account of the user. This includes social media sites such as Facebook. Any legal issues will be referred to the Police. Passwords Passwords must not be obvious or easily guessed; they must be kept confidential, and changed when prompted or when known by another user. Personal accounts cannot be shared. Students should not allow others to use their personal account for any reason. Students should log off at the end of each session to ensure no one else can use their account or laptop. Cybersafety At any time, if a student believes they have received a computer virus or spam (unsolicited email), or they have received a message that is inappropriate or makes them feel uncomfortable, they must inform their teacher, parent and/or caregiver as soon as is possible. Students are encouraged to explore and use the ‘Cybersafety Help’ Queensland Government website to talk, report and learn about a range of cybersafety issues. Students must seek advice if another user seeks personal information, asks to be telephoned, offers gifts by email or asks to meet a student....
Acceptable Computer and Internet Use. Federal law prohibits misuse of computer resources, and students using computers and/or internet access provided by CGTC are responsible for good behavior online, just as they are in a classroom or other area of the College. Complete information regarding acceptable use of computer and internet resources, as well as a list of computer crimes prohibited by state law in Georgia, are available in the student catalog. Reference: TCSG Procedure 3.3.
Acceptable Computer and Internet Use. Communication through internet and online communication services must comply with the Department’s Code of School Behaviour and the Responsible Behaviour Plan available on the school website. Students should be aware that they are held responsible for their actions while using the internet and online communication services. Students will be held responsible for any breaches caused by other person(s) knowingly using their account to access internet and online communication services. The misuse of internet and online communication services may result in disciplinary action which includes, but is not limited to, the withdrawal of access to services. Note: Use of internet and online communication services can be audited and traced to the account of the user.

Related to Acceptable Computer and Internet Use

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Additional Procedures Applicable to High Value Accounts 1. If a Preexisting Individual Account is a High Value Account as of December 31, 2013, the Reporting [FATCA Partner] Financial Institution must complete the enhanced review procedures described in paragraph D of this section with respect to such account by December 31, 2014. If based on this review, such account is identified as a U.S. Reportable Account, the Reporting [FATCA Partner] Financial Institution must report the required information about such account with respect to 2013 and 2014 in the first report on the Account. For all subsequent years, information about the account should be reported on an annual basis.

  • Xxxxxxx INTERNET Xxxxxx.Xxxxxxx@xxx.xxx TELEPHONE: (000) 000-0000 FAX: (000) 000-0000 /RA Xxxxxx Xxxxx for/ Xxxxx X. XxXxxxxxx, Director Division of Materials Safety and State Agreements Office of Federal and State Materials and Environmental Management Programs Enclosures:

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

Time is Money Join Law Insider Premium to draft better contracts faster.