Acceptable Computer and Internet Use Sample Clauses

Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or guardian permission is sought to give the student(s) access to the internet, based upon the policy contained within Information and Communication Technology (ICT) Procedure. Communication through internet and online communication services must comply with the Responsible Behaviour Plan available on the school website. Note: Use of internet and online communication services can be audited and traced to the account of the user.
AutoNDA by SimpleDocs
Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or caregiver permission is sought to give the student(s) access to the internet, based upon the relevant policies of Education Queensland. Communication through internet and online communication services must comply with the Student Code of Conduct available on the school website. There are conditions that students are required to adhere to. Students should not: • create, participate in or circulate content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place • disable settings for virus protection, spam and/or internet filtering that have been applied as part of the school standard • use unauthorised programs or intentionally download unauthorised software, graphics or music • intentionally damage or disable computers, computer systems or Queensland DET networks • use the device for unauthorised commercial activities, political lobbying, online gambling or any unlawful purpose. • Passwords must not be obvious or easily guessed; they must be kept confidential, and changed when prompted or when known by another user. • Personal accounts cannot be shared. Students should not allow others to use their personal account for any reason. Students should log off at the end of each session to ensure no one else can use their account or laptop. • Students should be conscious creators of the content and behaviours they exhibit online and take active responsibility for building a positive online reputation. They should be conscious of the way they portray themselves, and the way they treat others online. • Students should be mindful that the content and behaviours they have online are easily searchable, accessible and may form a permanent online record into the future. • Interactions within digital communities and environments should mirror normal interpersonal expectations and behavioural guidelines, such as when in a class or the broader community. • Parents are requested to ensure that their child understands this responsibility and expectation. The school’s behaviour policies also support students by providing school related expectations, guidelines and consequences.
Acceptable Computer and Internet Use. Communication through internet and online communication services must comply with the Department’s Code of School Behaviour and the Responsible Behaviour Plan available on the school website. Students should be aware that they are held responsible for their actions while using the internet and online communication services. Students will be held responsible for any breaches caused by other person(s) knowingly using their account to access internet and online communication services. The misuse of internet and online communication services may result in disciplinary action which includes, but is not limited to, the withdrawal of access to services. Note: Use of internet and online communication services can be audited and traced to the account of the user.
Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or caregiver permission is sought to give the student access to the internet, based upon the policy contained within Acceptable Use of the Department’s Information, Communication and Technology (ICT) Network and Systems. This policy also forms part of this Student Loan Agreement Form. The acceptable-use conditions apply to the use of the device and internet, both on and off the school grounds. Communication through internet and online communication services must comply with the Responsible Behaviour Plan For Students, available on the school website. In adhering to the acceptable use of ICT and Responsible Behaviour Plan, students should not: • create, participate in or circulate content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place • disable settings for virus protection, spam and/or internet filtering that have been applied as part of the school standard • use unauthorised programs and intentionally download unauthorised software, graphics or music • intentionally damage or disable computers, computer systems or Queensland DETE networks • use the device for unauthorised commercial activities, political lobbying, online gambling or any unlawful purpose.
Acceptable Computer and Internet Use. Federal law prohibits misuse of computer resources, and students using computers and/or internet access provided by CGTC are responsible for good behavior online, just as they are in a classroom or other area of the College. Complete information regarding acceptable use of computer and internet resources, as well as a list of computer crimes prohibited by state law in Georgia, are available in the student catalog. Reference: TCSG Procedure 3.
Acceptable Computer and Internet Use. 4.1 Students are not to create, participate in, or circulate content that attempts to undermine, hack into and/or bypass the hardware and software security mechanisms that are in place. 4.2 Upon enrolment into a New South Wales Government school, parental/caregiver permission was sought to allow the student to access the Internet at school based on the Online Communication Services: Acceptable Usage for School Students policy. Extracts are provided below. This policy forms part of the Laptops Loan Agreement. Extracts: Online Communication Services: Acceptable Usage for School Students • not disable settings for virus protection, spam and filtering that have been applied. • ensure that communication through internet and online communication services is related to learning. • keep passwords confidential, and change them when prompted, or when known by another user. • use passwords that are not obvious or easily guessed. • never allow others to use their personal e-learning account. • log off at the end of each session to ensure that nobody else can use their e-learning account. • promptly tell their supervising teacher if they suspect they have received a computer virus or spam (i.e. unsolicited email) or if they receive a message that is inappropriate or makes them feel uncomfortable. • seek advice if another user seeks excessive personal information, asks to be telephoned, offers gifts by email or wants to meet a student. • never knowingly initiate or forward emails or other messages containing: ▪ a message that was sent to them in confidence. ▪ a computer virus or attachment that is capable of damaging recipients’ computers. ▪ chain letters and hoax emails. ▪ spam, e.g. unsolicited advertising material. • never send or publish: ▪ unacceptable or unlawful material or remarks, including offensive, abusive or discriminatory comments. ▪ threatening, bullying or harassing another person or making excessive or unreasonable demands upon another person. ▪ sexually explicit or sexually suggestive material or correspondence. ▪ false or defamatory information about a person or organisation. • ensure that personal use is kept to a minimum and internet and online communication services are generally used for genuine curriculum and educational activities. Use of unauthorised programs and intentionally downloading unauthorised software, graphics or music that is not associated with learning, is not permitted. • never damage or disable computers, computer systems or netw...
Acceptable Computer and Internet Use. 4.1 Students are not to create, participate in, or circulate content that attempts to undermine, hack into and/or bypass the hardware and software security mechanisms that are in place. 4.2 Upon enrolment into a New South Wales Government school, parental/carer permission was sought to allow the student to access the Internet at school based on the Online Communication Services: Acceptable Usage for School Students policy. Extracts are provided below. 4.3 The Online Communication Services: Acceptable Usage for School Students policy applies to the use of the device and internet both on and off school grounds.
AutoNDA by SimpleDocs

Related to Acceptable Computer and Internet Use

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Purpose; Incorporation by Reference of Auction Procedures and Settlement Procedures (a) The Statement for each series of MuniPreferred will provide that the Applicable Rate for such series for each Subsequent Rate Period thereof shall, except under certain conditions, be the rate per annum that a bank or trust company appointed by the Fund advises results from implementation of the Auction Procedures for such series. The Board of Directors or Board of Trustees, as the case may be, of the Fund has adopted a resolution appointing the Auction Agent as auction agent for purposes of the Auction Procedures for each series of MuniPreferred. The Auction Agent accepts such appointment and agrees to follow the procedures set forth in this Section 2 and the Auction Procedures for the purpose of determining the Applicable Rate for each series of MuniPreferred for each Subsequent Rate Period thereof for which the Applicable Rate is to be determined by an Auction. Each periodic implementation of such procedures is hereinafter referred to as an "Auction." (b) All of the provisions contained in the Auction Procedures and the Settlement Procedures are incorporated herein by reference in their entirety and shall be deemed to be a part hereof to the same extent as if such provisions were fully set forth herein.

  • PREVAILING WAGE RATES - PUBLIC WORKS AND BUILDING SERVICES CONTRACTS If any portion of work being Bid is subject to the prevailing wage rate provisions of the Labor Law, the following shall apply:

  • Internet Use Customer assumes total responsibility for its and its users’ use of the Internet. Masergy specifically disclaims any warranties, endorsements or representations regarding any merchandise, information, software, products, data, files, or services provided through the Internet.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/. B. Grantee shall identify and document on the client records the primary language/dialect of a client who has limited English proficiency and the need for translation or interpretation services and shall not require a client to provide or pay for the services of a translator or interpreter. C. Grantee shall make every effort to avoid use of any persons under the age of 18 or any family member or friend of the client as an interpreter for essential communications with a client with limited English proficiency, unless the client has requested that person and using the person would not compromise the effectiveness of services or violate the client’s confidentiality and the client is advised that a free interpreter is available.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!