Examples of Inappropriate Use Sample Clauses

Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognize
AutoNDA by SimpleDocs
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognise • Sharing login/password with another person • Logging on to another person’s computer without his/her permission • Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only) • Removing labels and identifying stickers on the iPad • Using proxy sites to bypass web filtering • Videoing or taping on school property (not permitted unless it is related to a school assignment) • Emailing or chatting during class when not related to a school assignment • Using profanity • Gaming in class • Cheating • Inappropriate communication to the faculty or staff • Threats and/or cyber bullying of any kind • Logging into an iPad/application using a stolen login • Possession of inappropriate files • Pornography • Manufacturing – using a camera to create inappropriate pictures/movies • Distributing – sending/sharing inappropriate files with other individuals • Bootleg movies or music • Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case • Habitual and intentional disregard for the iPad Consequences include but are not limited to: • School suspensionAfter school detentionLoss of technology privileges up to a term • Disciplinary probation • Exclusion
Examples of Inappropriate Use. 1. Recreational pursuits 2. Social functions
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognise Sharing login/password with another person Logging on to another person’s computer without his/her permission Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only) Removing labels and identifying stickers on the iPad Using proxy sites to bypass web filtering Videoing or taping on school property (not permitted unless it is related to a school assignment) Emailing or chatting during class when not related to a school assignment Using profanity Gaming in class Cheating Inappropriate communication to the faculty or staff Threats and/or cyber bullying of any kind Logging into an iPad/application using a stolen login Possession of inappropriate files Pornography Manufacturing – using a camera to create inappropriate pictures/movies Distributing – sending/sharing inappropriate files with other individuals Bootleg movies or music Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case Habitual and intentional disregard for the iPad Consequences include but are not limited to: School suspension After school detention Loss of technology privileges up to a term Disciplinary probation Exclusion
Examples of Inappropriate Use. Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking.
Examples of Inappropriate Use i. File downloads not connected with County business. ii. Generating, sending, requesting, receiving, downloading, viewing, or archiving material in any form, i.e., text, graphics, etc. which contains offensive or obscene language or content, or is harassing in nature. iii. Engaging in activities resulting in personal gain, such as engaging in any personal business or commercial transaction, exhibiting items for sale, or transacting other personal business. iv. Engaging in any unlawful activity. v. Copyright infringement. vi. Transmitting any County sensitive information over the Internet by other than secured transmission. vii. Creating, furthering or participating in any act of fraud, waste or abuse through Internet activities. viii. Intentionally disrupting network traffic or crashing the network and connected systems (for example: sabotage, intentionally introducing a computer virus). ix. Engaging in any other act of misconduct such as discrimination, sexual harassment, and misuse of position. x. Excessive or multiple Internet sessions, unless needed for official County business. xi. Use of continuous services such as PointCast, live audio, live radio, and live video feeds unless needed for official County business, or as permitted by the Department Head except when a directive from the IT Department prohibits such use because of interference with County business needs.
Examples of Inappropriate Use i. Illegal or impermissible activities as defined as a violation of County policy, state, and/or federal law. ii. Anything that may be construed as harassment or disparagement of others based on race, national origin, sex, sexual orientation, age, disability or religious or political beliefs, or any other protected status will not be tolerated. These include, but are not limited to, slurs, obscene messages, materials, and pictures, or religious materials. iii. Anything that may be construed as disruptive, threatening, offensive to others, or harmful to morale. iv. Copyright infringement. v. Items of a political nature or having to do with political activities. vi. Unauthorized distribution of personnel or medical information. vii. Use of E-mail when signed documents are required (Note: Use of E-mail to distribute documents for signature is acceptable). viii. Purposely creating any message that purports to be from another person without their permission. ix. Unauthorized use of County mailing lists. x. Unauthorized access to others’ files with no substantial business purpose, or vandalizing the data of another user. xi. Personal messages, including but not limited to, chain letters and broadly distributed e-mails regarding personal matters or interests.
AutoNDA by SimpleDocs
Examples of Inappropriate Use.  Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking.  Disabling or attempting to disable any system monitoring or filtering or security measures.  Sharing user names and passwords with others; and/or borrowing someone else’s username, password, or account access.  Purposefully opening, viewing, using, or deleting files belonging to another system user without permission.  Electronically posting personal information about one’s self or others (i.e., addresses, phone numbers, and pictures).  Downloading or plagiarizing copyrighted information with permission from the copyright holder.  Intentionally introducing a virus or other malicious programs onto the district’s system.  Electronically posting messages or accessing materials that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal.  Wasting or abusing school resources through unauthorized system use (e.g. playing online games, downloading music, watching video broadcast, participating in chat rooms, etc.).  Gaining unauthorized access to restricted information or network resources. Cyberbullying is defined as the use of any Internet-connected device for the purpose of bullying, harassing, or intimidating another student. This is includes, but may not be limited to:  Sending abusive text messages to cell phones, computers, or Internet- connected game consoles.  Posting abusive comments on someone’s blog or social networking site (e.g., Twitter, Instagram, or Facebook)  Creating a Web page that masquerades as the victim’s personal site and using it to embarrass him or her.  Making it appear that the victim is posting malicious comments about friends to isolate him or her from friends.
Examples of Inappropriate Use. ● Using a Chromebook device not assigned to you without teacher permission ● Attempting to bypass TCS web filtering and blocked sites ● Video or audio recording when not related to a school assignment ● Frivolous use of the Chromebook at school, such as, but not limited to gaming, watching YouTube, etc. ● Inappropriate communications to TCS faculty, staff, or students ● Threats and/or cyber bullying of any kind ● Possessing, accessing, sending/sharing of inappropriate files

Related to Examples of Inappropriate Use

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!