Inappropriate and Unacceptable Use Sample Clauses

Inappropriate and Unacceptable Use. You shall not use the Solution in any manner that constitutes inappropriate or unacceptable use, which includes, but is not limited to: (a) Collecting, using, or disclosing Personal Information in contravention of the Freedom of Information and Protection of Privacy Act, the Municipal Freedom of Information and Protection of Privacy Act, the Personal Health Information Protection Act, 2004, or any other applicable law. (b) Accessing the Solution and the Personal Information contained within the Solution for any purpose other than the Purpose.
Inappropriate and Unacceptable Use. You shall not use the Solution in any manner that constitutes inappropriate or unacceptable use, which includes, but is not limited to: Collecting, using, or disclosing Personal Information in contravention of the Freedom of Information and Protection of Privacy Act, the Municipal Freedom of Information and Protection of Privacy Act, the Personal Health Information Protection Act, 2004, or any other applicable law. Accessing the Solution and the Personal Information contained within the Solution for any purpose other than the Purpose. Collecting, using or disclosing Personal Information in the Solution which is not required for your use of the Solution. Accessing, viewing, editing, updating or modifying any information or data in the Solution unless such access, viewing, editing, updating or modification is for the Purpose. Destroying or encrypting data and visual aids except as expressly permitted in documentation supplied by the Ministry or as required by applicable law. Making, possessing or distributing computer programs that are designed to assist in obtaining access to the Solution in violation of any agreement, this Policy or applicable laws. Wilfully bypassing or subverting physical, logical or procedural safeguards such as firewalls, web-filtering software or other access controls or attempting to gain access to the Solution other than through your access contemplated by this Policy. Sharing passwords, or other system access tools with un-authorized individuals or entities for any purpose. Facilitating the violation of this Policy. Violating or facilitating the violation of a third party’s acceptable use policy during your use of the Solution. Infringing intellectual property rights including copyrights, trade secrets, or trademarks. Disclosing Confidential Information about the Solution, except as required by law. Posting or submitting any material or information into the Solution that: is abusive, defamatory, discriminatory, offensive, irrelevant or unlawful; you do not have the legal right to post in the Solution, or otherwise to publish or distribute; is for advertising or commercial purposes; or you know to be false, inaccurate or misleading.
Inappropriate and Unacceptable Use. You shall not use the Solution in any manner that constitutes inappropriate or unacceptable use, which includes, but is not limited to:

Related to Inappropriate and Unacceptable Use

  • Unacceptable Use Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service(to the extent that such use is not licensed by this XXXX); (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Right to Refuse Dangerous Work An employee shall have the right to refuse to work in dangerous situations.

  • Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.

  • Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.

  • Concealed or Unknown Conditions If the Contractor encounters conditions at the site that are (1) subsurface or otherwise concealed physical conditions that differ materially from those indicated in the Contract Documents or (2) unknown physical conditions of an unusual nature, that differ materially from those ordinarily found to exist and generally recognized as inherent in construction activities of the character provided for in the Contract Documents, the Contractor shall promptly provide notice to the Owner and the Architect before conditions are disturbed and in no event later than twenty-one (21) calendar days after first observance of the conditions. The Owner will promptly investigate such conditions and, if the Owner determines that they differ materially and cause an increase or decrease in the Contractor’s cost of, or time required for, performance of any part of the Work, will authorize an equitable adjustment in the Contract Sum or Contract Time, or both. If the Owner determines that the conditions at the site are not materially different from those indicated in the Contract Documents and that no change in the terms of the Contract is justified, the Owner shall promptly notify the Contractor in writing, stating the reasons. If the Contractor disputes the Owner’s determination, the Contractor party may assert a Claim as provided in Article 15.

  • Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • FUTURE ACTIVITIES AND UNKNOWN CONDITIONS This Agreement shall not operate to shield the Respondent from liability arising from future activities, as of the date of execution of this Agreement.