Hacking" and Other Illegal Activities. It is a violation of this Policy to use the School's computer network or the Internet to gain unauthorized access to other computers or computer systems, or to attempt to gain such unauthorized access. Any use which violates State or Federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which violates any other applicable law or municipal ordinance, is strictly prohibited.
Appears in 7 contracts
Samples: Ipad Loan Agreement, Chromebook Use Agreement, Ipad Loan Agreement
Hacking" and Other Illegal Activities. It is a violation of this the Policy to use the School's school’s computer network or the Internet to gain unauthorized access to other computers or computer systems, systems or to attempt to gain such unauthorized access. Any use which that violates State or Federal law relating to copyrightlocal, trade secrets, the distribution of obscene or pornographic materialsstate, or which violates any other applicable federal law or municipal ordinance, is strictly prohibitedprohibited and will be reported to appropriate authorities.
Appears in 2 contracts
Samples: Computer Network and Internet Acceptable Use Policy Agreement, Acceptable Use Policy Agreement
Hacking" and Other Illegal Activities. It is a violation of this Policy policy to use the School's school’s computer network or the Internet to gain unauthorized access to other computers or computer systems, or to attempt to gain such unauthorized access. Any use which violates State state or Federal federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which violates any other applicable law or municipal ordinance, is strictly prohibited.
Appears in 1 contract
Samples: School Handbook
Hacking" and Other Illegal Activities. It is a violation of this Policy to use the Schoolschool's computer network or the Internet to gain unauthorized access to other computers or computer systems, or to attempt to gain such unauthorized access. Any use which that violates State state or Federal federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which that violates any other applicable law or municipal ordinance, is strictly prohibited.
Appears in 1 contract
Samples: Computer Network and Internet Acceptable Use Policy and Agreement
Hacking" and Other Illegal Activities. It is a violation of this Policy policy to use the School's school’s computer network or the Internet to gain unauthorized access to other computers or computer systems, systems or to attempt to gain such unauthorized access. Any use which that violates State or Federal law relating to copyrightlocal, trade secrets, the distribution of obscene or pornographic materialsstate, or which violates any other applicable federal law or municipal ordinance, is strictly prohibitedprohibited and will be reported to appropriate authorities.
Appears in 1 contract
Samples: Acceptable Use Policy
Hacking" and Other Illegal Activities. It is a violation of this the Policy to use the School's school’s computer network or the Internet to gain unauthorized access to other computers or computer systems, systems or to attempt to gain such unauthorized access. Any use which that violates State local, state or Federal federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which violates any other applicable law or municipal ordinance, is strictly prohibitedprohibited and will be reported to appropriate authorities.
Appears in 1 contract
Samples: Acceptable Use Policy Agreement