Acceptable Use of IT Sample Clauses

Acceptable Use of IT. Assets Policy and not allow family members or friends access to county equipment or software. 2. Disable the VPN or other network connections when I am not using it. 3. Promptly return county-owned software, equipment and documents when requested.
AutoNDA by SimpleDocs
Acceptable Use of IT. Digital technologies have become integral to the lives of children and young people, both within schools and outside school. These technologies are powerful tools, which open up new opportunities for everyone. These technologies can stimulate discussion, promote creativity and stimulate awareness of context to promote effective learning. People should have an entitlement to safe access at all times. This Acceptable Use Policy is intended to ensure: • That people will be responsible users and stay safe while using the internet and other digital technologies for educational, personal and recreational use. • That school systems and users are protected from accidental or deliberate misuse that could put the security of the systems and users at risk. The school will try to ensure that everyone has good access to digital technologies to enhance their learning and will, in return, expect them to agree to be responsible users. • Responsibility: School IT systems must be used in a responsible way, to ensure that there is no risk to your safety or to the safety and security of the IT systems and other users.
Acceptable Use of IT. I understand that the school also has the right to take action against me if I am involved in incidents of inappropriate behaviour, that are covered in this agreement, or when I am out of school and where they involve my membership of the school community (examples would be cyber- bullying, use of images or personal information). Yes / No
Acceptable Use of IT. As part of your role you will be granted access to computing systems and hardware in the mediaHUB and the radio studios. When using these systems, we ask you to abide by the University Acceptable Use Policy, Email and Internet Policies and by the following: 6.5.1. PASSWORDS – When issued with passwords for IT systems, you should not share them with other people, and ensure you log out of accounts and systems when you are finished. Do not leave machines logged in, and do not store your personal passwords on our systems. We take privacy seriously; this includes posting comments using the social media accounts of your colleagues which have been left open.

Related to Acceptable Use of IT

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Acceptable Use Policy In connection with Retailer’s use of the Headset Solution, Retailer agrees that it will not: (a) Make Available any Retailer Data that, in Headset’s sole discretion, (i) is unlawful, tortious, defamatory, vulgar, obscene, libelous, or racially, ethnically or otherwise objectionable; (ii) violates, or encourages any conduct that would violate, any applicable law or regulation or would give rise to civil liability; (iii) promotes discrimination, bigotry, racism, hatred, harassment or harm against any individual or group; (iv) is violent or threatening, or promotes violence or actions that are threatening to any other person; or (v) promotes illegal or harmful activities; (b) harm minors in any way; (c) impersonate any person or entity, including, but not limited to, Headset personnel, or falsely state or otherwise misrepresent your affiliation with a person or entity; (d) Make Available any Retailer Data that you do not have a right to Make Available under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under non-disclosure agreements); (e) Make Available any Retailer Data that infringes the rights of any person or entity, including without limitation, any Intellectual Property Rights, or privacy, publicity or other proprietary or contractual rights; (f) intentionally or unintentionally violate any applicable local, state, national or international law or regulation, or any order of a court; (g) harass any person; or (h) advocate, encourage or assist any third party in doing any of the foregoing activities in this section.

  • Unacceptable Use Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!