Digital Citizenship and Internet safety Sample Clauses

Digital Citizenship and Internet safety. The School shares responsibility with parents, the government and the community to protect children from the impact of inappropriate material on the Internet. This protection at Mount Xxxxxx South Primary School comes in the form of a number of mechanisms to block inappropriate content. No internet filtering mechanism is perfect and for this reason at the School, every Internet request and download is recorded, logging user ID, time, page element accessed, size of element, method of access and the machine from which the request was made. The IT Department can inspect these logs for breaches of protocol. Students found to be accessing inappropriate material will be referred to the Teacher/Principal. The action taken will depend on the offence and may include notification of parents. Students are reminded to use Cyber-Safe strategies and use the Internet in a safe and ethical manner. In particular students must: • Tell the system administrator(s) or their parents if an indecent, suggestive, discriminatory or threatening message is encountered. • Be aware that people they “meet” or communicate with on-line may pretend to be someone else. • Remember that anything they read on-line may not be accurate and avoid offers involving either financial transactions or personal meetings. • Not give out any identifying details such as their home address, telephone number, or school address in a public chat site or bulletin board or give out personal information such as age or financial position. • Not arrange a meeting with another person they have “met” or communicated with by IPad without prior parental approval. If a meeting is arranged, it should be in a public place in the presence of a parent or responsible adult. • Not respond to messages or bulletin board items that are indecent, suggestive, belligerent, discriminatory, threatening, or which make the user feel uncomfortable or unsafe in any way.
AutoNDA by SimpleDocs

Related to Digital Citizenship and Internet safety

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Ownership and Publication of Materials All reports, information, data, and other materials prepared by the Consultant pursuant to this agreement are the property of the City. The City has the exclusive and unrestricted authority to release, publish or otherwise use, in whole or part, information relating thereto. Any re-use without written verification or adaptation by the Consultant for the specific purpose intended will be at the City’s sole risk and without liability or legal exposure to the Consultant. No material produced in whole or in part under this agreement may be copyrighted or patented in the United States or in any other country without the prior written approval of the City.

  • Ownership and Reuse of Documents All documents, data, reports, research, graphic presentation materials, etc., developed by Contractor as a part of its work under this Agreement, shall become the property of County upon completion of this Agreement, or in the event of termination or cancellation thereof, at the time of payment under Section 3 for work performed. Contractor shall promptly furnish all such data and material to County on request.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • OWNERSHIP AND USE OF DOCUMENTS 1.3.1 All drawings, specifications, estimates, and all other documents, including shop drawings and calculations, prepared at any time in connection with the Project, shall, upon payment for services in connection therewith, become the sole property of the State.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • COMMERCIAL REUSE OF SERVICES The member or user herein agrees not to replicate, duplicate, copy, trade, sell, resell nor exploit for any commercial reason any part, use of, or access to 's sites.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!