Acceptable Use Guidelines. The use of electronic information resources must be in support of education, research and the educational goals and objectives of LVISD.
Acceptable Use Guidelines. Inappropriate/Unacceptable Use Students should understand that the rules and expectations that apply to non-technology related conduct and communication also govern student use of computers. Just as listening to music on phones (or anything with a headset) and playing video games are not acceptable school behavior during class, neither is instant messaging, listening to music, or playing non-educational games on the Chromebook. Recording, either audio or video, on school property is not permitted unless it is authorized by a teacher/other school personnel.
Acceptable Use Guidelines. 7a: General Guidelines ● The District Acceptable Use Policy applies to all student use of Chromebook devices ● Students will have access to all available forms of electronic media and communication, which is in support of education and research and in support of the educational goals, and objectives of the Haverford School District. ● Students are responsible for their ethical and educational use of the technology resources of the Haverford School District. ● Access to the Haverford School District technology resources is a privilege and not a right and can be revoked at any time. ● Transmission of any material that is in violation of any federal or state law is prohibited. This includes, but is not limited to the following: confidential information, copyrighted material, threatening or obscene material, and Chromebook viruses. ● Any attempt to alter data, the configuration of a Chromebook, or the files of another user, without the consent of the individual, building administrator, or technology administrator, will be considered an act of vandalism and subject to disciplinary action in accordance with the Acceptable Use Policy, student handbook and other applicable school policies. 7b: Privacy & Safety ● Do not go into chat rooms or send chain letters without permission. If applicable, teachers may create discussion groups for communication among students for educational purposes. ● Do not open, use, or change files that do not belong to you. ● Do not reveal your full name, phone number, home address, social security number, credit card numbers, password or passwords of other people. ● Do not use your school email for personal email communication. ● Remember that storage is not guaranteed to be private or confidential as all Chromebook equipment is the property of the Haverford School District. ● If you inadvertently access a website that contains obscene, pornographic, or otherwise offensive material, exit the site immediately. 7c: Legal Property ● Comply with trademark and copyright laws and all license agreements. Ignorance of the law is not immunity. If you are unsure, ask a teacher or parent. ● Plagiarism is a violation of the student policy. Give credit to all sources used, whether quoted or summarized. This includes all forms of media on the Internet, such as graphics, movies, music, and text. ● Use or possession of hacking software is strictly prohibited and violators will be subject to discipline. Violation of applicable state or federal law, incl...
Acceptable Use Guidelines. I understand that the use of electronic information resources must be in support of education, research, and the educational goals and objectives of the District. • I understand that electronic mail is not private. • I understand that many services and products are available for a fee and acknowledge that I am responsible for any expenses incurred. • I agree not to submit, publish, display, or retrieve any defamatory, abusive, obscene, profane, sexually oriented, threatening, racially offensive, or illegal material. • I will use electronic information resources for educational purposes only. • I will abide by all copyright regulations. • I will not reveal home addresses or personal phone numbers of myself or others. • I will not use the network in any way that disrupts the use of the network by others. • I will not use the network for commercial purposes. • I will follow all of the rules of the Lyndhurst Student Code of Conduct while using electronic information resources. • I will not attempt to harm, modify, or destroy hardware or software, or interfere with system security. • I understand all electronic devices whether personal or district issued must be enrolled in the Lyndhurst Public Schools network.
Acceptable Use Guidelines. Customer will at all times comply with and conform its use of the Service to the Hurricane Acceptable Use Guidelines (set forth at Hurricane’s website), as updated from time to time. In the event Customer violates Hurricane’s Acceptable Use Guidelines, Hurricane shall have the right to immediately suspend Service. Hurricane will provide notice and opportunity to cure, if and to the extent Hurricane deems practicable, depending on the nature of the violation and availability of the Customer. Hurricane, in its reasonable discretion, may re-enable the Service upon satisfaction that all violations have ceased and with adequate assurance that such violations will not occur in the future.
Acceptable Use Guidelines. Customer is ultimately responsible for any and all activity that originates from Customer's Internet circuit regardless of Customer's knowledge of such activity. This includes, but is not limited to, activity by employees, visitors and guests or other household members. This also applies to security breaches of Customer's own system by others who launch attacks from Customer's machine. It is imperative that everyone with an Internet connection takes proper precautions to ensure the security of their machine. Customer is liable and accountable for any activity originating from any of Customer's Systemseven account services that is deemed to be in violation of Systemseven's Acceptable Use Policy. Systemseven vigorously pursues all instances of abuse. If Customer feels Customer has been attacked or spammed, Customer should notify Systemseven's Abuse Department (xxxxx@xxxxxxxxxxx.xxx) so that appropriate action can be taken. An existing Systemseven customer ("Existing Customer") may not, via phone or online account access, establish a new user associated with his or her account where the person on whose behalf the new user was established ("New Person") would have a reasonable expectation of privacy with regard to the account information, including CPNI, associated with the services the New Person receives from Systemseven. Such a reasonable expectation is present if such New Person would consider himself or herself to be a Systemseven customer, separate and apart from the Existing Customer. In the event of activity that could be considered deliberately or otherwise abusive or in violation of this Acceptable Use Policy, Systemseven reserves the right to suspend and/or terminate Customer's account and all Systemseven-provided services immediately, without advance notice. Systemseven reserves the right, at its sole discretion, to make a determination of what constitutes abuse and Customer agrees that Systemseven's determination is final and binding on Customer. Systemseven reserves the right to modify or terminate services at Systemseven's sole discretion.
Acceptable Use Guidelines. At all times, Customer shall comply with a11 applicable state, federal and international laws with respect to Customer’s operations in the Premises, the Colocation Space and the Services. If Customer fails to fully cooperate with any investigation by Switch or any governmental authority, or fails to immediately rectify any illegal use. Customer will be in material breach of this MSA. Customer’s use of the Colocation Space and the Services may only be for lawful purposes and is subject to Customer’s compliance with Switch’s and each Carrier’s Acceptable Use Policy (“AUP”), as such may be amended from time to time by Switch or the applicable Carrier. Switch’s AUP and updates thereto are available at Transmission of any material in violation of any law, regulation or an AUP is strictly prohibited. Any access made to other networks connected to Switch Network must comply with the rules appropriate to the other network and the AUP. Customer agrees to indemnify, defend and hold harmless Switch from any and all Claims arising from or relating to Customer’s operations which utilize the Services and pay all related Costs.
Acceptable Use Guidelines. Inappropriate/Unacceptable Use Students should understand that the rules and expectations that apply to non-technology related conduct and communication also govern student use of computers. Just as listening to music on iPods (or anything with a headset) and playing video games are not acceptable school behavior during class, neither is instant messaging, listening to music, or playing non-educational games on the Chromebook. Recording, either audio or video, on school property is not permitted unless it is authorized by a teacher/other school personnel. Tier I: Inappropriate Use ● Deleting any folders or files you did not create or are shared with other students. ● Sharing login/password with another person ● Logging on to another person’s computer without his/her permission ● Removing labels and identifying stickers on NPD117 property (Chromebook, case, charger) ● Downloading inappropriate digital content such as videos / music ● Altering the computer hardware or software in any way ● Attempting to bypass web filtering ● Videoing or recording on school property is not permitted unless authorized by school personnel ● Emailing or chatting during class when not related to a school assignment ● Using profanity ● Gaming ● Cheating ● Use of desktop pictures or Chrome themes that are inappropriate or offensive ● Intentional actions which are potentially harmful to the computer, charger, and/or Shuttle case ● Making online purchases Examples of consequences for Tier I infractions include, but are not limited to: loss of Chromebook privileges, detention or suspension. Tier 2: Unacceptable Use ● Inappropriate communication to the faculty or staff ● Threats and/or cyber bullying of any kind ● Using a computer to plan a fight, cause harm or commit a crime ● Logging into a computer/application using a stolen login ● Possession of inappropriate files ● Pornography can be a felony offense and if so will be turned over to authorities ● Manufacturing – using a camera to create inappropriate pictures/movies ● Distributing – sending/sharing inappropriate files with other individuals ● Gang related files ● Bootleg movies or music ● Habitual and intentional disregard for the Chromebook Examples of Consequences for Tier 2 infractions include, but are not limited to:
Acceptable Use Guidelines. Customer is ultimately responsible for any and all activity that originates from Customer's Internet circuit regardless of Customer's knowledge of such activity. This includes, but is not limited to, activity by employees, visitors and guests or other household members. This also applies to security breaches of Customer's own system by others who launch attacks from Customer's machine. It is imperative that everyone with an Internet connection takes proper precautions to ensure the security of their machine. Customer is liable and accountable for any activity originating from any of Customer's Speakeasy account services that is deemed to be in violation of Speakeasy's Acceptable Use Policy. Speakeasy vigorously pursues all instances of abuse. If Customer feels Customer has been attacked or spammed, Customer should notify Speakeasy's Abuse Department (xxxxx@xxxxxxxxx.xxx) so that appropriate action can be taken. An existing Speakeasy customer ("Existing Customer") may not, via phone or online account access, establish a new user associated with his or her account where the person on whose behalf the new user was established ("New Person") would have a reasonable expectation of privacy with regard to the account information, including CPNI, associated with the services the New Person receives from Speakeasy. Such a reasonable expectation is present if such New Person would consider himself or herself to be a Speakeasy customer, separate and apart from the Existing Customer. In the event of activity that could be considered deliberately or otherwise abusive or in violation of this Acceptable Use Policy, Speakeasy reserves the right to suspend and/or terminate Customer's account and all Speakeasy- provided services immediately, without advance notice. Speakeasy reserves the right, at its sole discretion, to make a determination of what constitutes abuse and Xxxxxxxx agrees that Speakeasy's determination is final and binding on Customer. Speakeasy reserves the right to modify or terminate services at Speakeasy's sole discretion.
Acceptable Use Guidelines. All users shall adhere to the following guidelines of acceptable use: All use of the computer network and/or Internet will be in support of educational activities. Users will report misuse and breaches of network security. Users shall not access, delete, copy, modify, nor forge other users’ e-mails, files, or data. Users shall not use other users’ passwords nor disclose their password to others. Users shall not pursue unauthorized access, disruptive activities, nor other actions commonly referred to as “hacking,” internally or externally to the district. Users shall not disclose confidential information about themselves or others. User shall not utilize unlicensed software. Users shall not access or permit access to pornography, obscene depictions, or other materials harmful to minors. Users shall not disable or attempt to disable Internet filtering software. Prohibitions Although the USD 385 reserves the right to determine what use of the district network is appropriate, the following actions are specifically prohibited: Transferring copyrighted materials to or from any district network without the express consent of the owner of the copyright. Use of the network for creation, dissemination, or viewing of defamatory, factually inaccurate, abusive, obscene, profane, sexually oriented, threatening, harassing, or other material prohibited by law or district policy. Dissemination of personnel or student information via the network when such information is protected by law, including the Family and Educational Rights Act or Student Data Privacy Act. Utilization of the network to disseminate non-work-related material. Utilization of the network as a means for advertising or solicitation.