ICT Acceptable Use (Computer Network Agreement Sample Clauses

ICT Acceptable Use (Computer Network Agreement. Policy The School’s network provides data communication links within the School and beyond including the Internet. The Internet offers valuable learning experiences and sources of information. At the same time, there are potential hazards. While our staff make every effort to avoid misuse of the Internet, by student education, staff supervision and the use of filtering technology, students may still access material which is not appropriate. There are opportunities with computer networks for students to conduct themselves in ways that are unacceptable and to create and distribute inappropriate materials. The School teaches students good practice, imposes control on what students see and do and informs parents of potential risks and benefits. School will monitor use and ICT Staff may review files and communications to maintain system integrity. Backups are made every evening but the user is responsible for independently maintaining copies of valuable data. Use of another individual's password-protected account is prohibited. Where password- protected accounts are used, network users are personally responsible for all activity that occurs within their account. Any attempts at unauthorized access of School data will result in termination of the user's computer and network privileges. Any attempt to vandalise School network accounts or systems will result in termination of the user's computer and network privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another member, the School, or any of the agencies or other networks that are connected to the Internet. This includes, but is not limited to, the uploading or creation of computer viruses. School reserves the right to modify this ICT Acceptable Use (Computer Network Agreement) Policy for ICT, as appropriate. Changes will be published on the School website. Author: S Luck, Director of ICT Policy Reviewed at SMT: September 2016 Policy Reviewed by Governors: October 2016 Next Review Due: September 2017 NEWCASTLE UNDER LYME SCHOOL *Senior School COMPUTER NETWORK AGREEMENT FOR PUPILS At the end of this document you and your parent/guardian will be asked to sign to indicate that you have understood the principles and rules of using the Newcastle-under-Lyme School’s computer network and accessing the Internet and e-mails. If you choose not to sign this document you will not be able to use the network.
AutoNDA by SimpleDocs

Related to ICT Acceptable Use (Computer Network Agreement

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Acceptable Use Agreement I understand that I must use school ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. I will, where possible, educate the young people in my care in the safe use of ICT and embed E-Safety in my work with young people including my ‘Prevent’ duty. For my professional and personal safety: • I understand that the school will monitor my use of the ICT systems, email and other digital communications. • I understand that the rules set out in this agreement also apply to use of school ICT systems (e.g. laptops, email, VLE etc.) out of school, and to the transfer of personal data (digital or paper based) out of school • I understand that the school ICT systems are intended for educational use and that I will only use the systems for personal or recreational use within the policies and rules set down by the school. • I will not disclose my username or password to anyone else, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it. • I will immediately report any illegal, inappropriate or harmful material or incident, I become aware of, to the appropriate person.  Will report damaged equipment to the ICT support staff and will not attempt to repair any damage. I will be professional in my communications and actions when using school ICT systems: • I will not access, copy, remove or otherwise alter any other user’s files, without their express permission. • I will ensure that when I take and / or publish images of others I will do so with their permission and in accordance with the school’s policy on the use of digital / video images. If my personal device is used to record images this should be transferred to school systems and deleted from my device as soon as is practicable • I will only use chat and social networking sites in school in accordance with the school’s policies. • I will only communicate with students / pupils and parents / carers using official school systems. • I will not engage in any on-line activity that may compromise my professional responsibilities or be harmful to the reputation of the school. The school and the local authority have the responsibility to provide safe and secure access to technologies and ensure the smooth running of the school: • I will not use personal email addresses when communicating with pupils and parents. • I will not try to upload, download or access any materials which are illegal (including but not restricted to child sexual abuse images, criminally racist material, adult pornography covered by the Obscene Publications Act) or inappropriate or may cause harm or distress to others. I will not try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials. • I will not install or attempt to install programmes of any type on a machine, or store programmes on a computer and understand that all software should be appropriately licenced. • I will not disable or cause any damage to school equipment, or the equipment belonging to others. • Where digital personal data is transferred outside the secure local network, it must be encrypted. • I understand that the GDPR policy requires that any staff or student / pupil data to which I have access, will be kept private and confidential. • I will immediately report any damage or faults and loss of data to an appropriate person. I understand that I am responsible for my actions in and out of the school: • I understand that this Acceptable Use Agreement applies not only to my work and use of school ICT equipment in school, but also applies to my use of school ICT systems and equipment off the premises and my use of personal equipment on the premises or in situations related to my employment by the school • I understand that if I fail to comply with this Acceptable Use Agreement, I could be subject to disciplinary action. I have read and understand the above and agree to use the school ICT systems (both in and out of school) and my own devices (in school and when carrying out communications related to the school) within these guidelines. Staff / Volunteer Name Signed

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.)

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Stop Work Order (a) NYSERDA may at any time, by written Order to the Contractor, require the Contractor to stop all or any part of the Work called for by this Agreement for a period of up to ninety (90) days after the Stop Work Order is delivered to the Contractor, and for any further period to which the parties may agree. Any such order shall be specifically identified as a Stop Work Order issued pursuant to this Section. Upon receipt of such an Order, the Contractor shall forthwith comply with its terms and take all reasonable steps to minimize the incurrence of costs allocable to the Work covered by the Order during the period of work stoppage consistent with public health and safety. Within a period of ninety (90) days after a Stop Work Order is delivered to the Contractor, or within any extension of that period to which the parties shall have agreed, NYSERDA shall either:

Time is Money Join Law Insider Premium to draft better contracts faster.