Common use of INAPPROPRIATE USES Clause in Contracts

INAPPROPRIATE USES. Using the resources for any illegal purpose. • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. • Damaging technology resources or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable any Internet filtering device or antivirus software. • Encrypting communications to avoid security review. • Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone else when posting, transmitting, or receiving messages. • Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. • Using resources to engage in conduct that harasses or bullies others. • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. • Using inappropriate language such as swear words, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themself, such as addresses and phone numbers. • Responding (if student) or permitting a student to respond (if an employee or other non-student) to requests for personally identifying information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) to meet in person people met online. If a request for such a meeting is received by a student, it should be reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulation. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • Wasting school resources through the improper use of the District’s technology resources, including sending spam. • Gaining unauthorized access to restricted information or resources.

Appears in 2 contracts

Samples: Technology Resources Acceptable Use Agreement, Technology Resources Acceptable Use Agreement

AutoNDA by SimpleDocs

INAPPROPRIATE USES. Using the resources for any illegal purpose, including threatening school safety. Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. Damaging technology resources electronic communication system or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable or bypass any Internet internet filtering device or antivirus softwaredevice, including personal devices (BYOT). Encrypting communications to avoid security review. Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone some else when posting, transmitting, or receiving messages. Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. Using resources to engage in conduct that harasses or bullies others. Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying prohibited harassment and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. Using inappropriate language such as swear wordscursing, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themself, such as addresses and phone numbers. • Responding (if student) or permitting a student to respond (if an employee or other non-student) to requests for personally identifying information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) to meet in person people met online. If a request for such a meeting is received by a student, it should be reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulation. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via ● Posting or transmitting pictures of students without obtaining prior permission from all individual depicted or from parents of depicted students who are under the District’s technology resources should be assumed to be copyrighted unless otherwise statedage of 18. Wasting school resources through the improper use of the District’s technology resources, including sending spam. Gaining unauthorized access to restricted information or resources.

Appears in 1 contract

Samples: Employee Agreement

INAPPROPRIATE USES. The following are examples of inappropriate uses of technology resources that may result in loss of privileges or disciplinary action: · Using the resources for any illegal purpose, including threatening school safety. · Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. · Damaging technology resources electronic communication systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • · Disabling or attempting to disable or bypass any Internet filtering device or antivirus softwaredevice. • Encrypting communications to avoid security review. • · Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • · Pretending to be someone else when posting, transmitting, or receiving messages. · Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. · Using resources to engage in conduct that harasses or bullies others. · Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying cyberbullying and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. • · Using inappropriate language such as swear wordscursing, vulgarity, ethnic or racial slurs, and any other inflammatory language. · Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themselfyourself or others, such as addresses and addresses, phone numbers. • Responding (if student) , or permitting a student to respond (if an employee photographs without permission, or other non-student) responding to requests for personally identifying identifiable information or contact from unknown individuals. · Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) appointments to meet in person people met online. If a request for such a meeting is received by a studentreceived, it should be immediately reported to a teacher or administrator immediatelyadministrator. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulation. • · Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • · Wasting school resources through the improper use of the District’s technology resources, including sending spam. • Gaining · Downloading or attempting to download unauthorized applications/extensions or software or gaining unauthorized access to restricted information or resources.

Appears in 1 contract

Samples: Student Agreement

INAPPROPRIATE USES. Using the resources for any illegal purpose. • Accessing the resources to knowingly alter, damage, or delete District property or informationinfor- mation, or to breach any other electronic equipment, network, or electronic communications communica- tions system in violation of the law or District policy. • Damaging technology resources electronic communication systems or electronic equipment, including knowingly know- ingly or intentionally introducing a virus to a device or network, or not taking proper security se- curity steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable any Internet filtering device or antivirus softwaredevice. • Encrypting communications to avoid security review. • Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone else when posting, transmitting, or receiving messages. • Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittaltrans- mittal, or receipt of electronic media. • Using resources to engage in conduct that harasses or bullies others. • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying cyberbullying and “sexting.” • Using e-mail or Web sites Websites to engage in or encourage illegal behavior or to threaten school safety. • Using inappropriate language such as swear words, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themselfyourself or others, such as addresses and phone numbers. • Responding (if student) or permitting a student to respond (if an employee or other non-student) to requests for personally identifying information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) appointments to meet in person people met online. If a request for such a meeting is received by a studentreceived, it should be reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law18. • If a student is taking pictures for school or at school functions, policy, or regulationthen the GPS (Global Po- sitioning Satellite) setting must be turned off on the student’s device. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • Wasting school resources through the improper use of the District’s technology resourcesre- sources, including sending spam. • Gaining unauthorized access to restricted information or resources. CONSEQUENCES FOR INAPPROPRIATE USE • Suspension of access to the District’s technology resources; • Revocation of the account; • Revocation of permission to use personal electronic devices for instructional purposes while on campus; or • Other disciplinary or legal action, in accordance with the Student Code of Conduct and applicable laws.

Appears in 1 contract

Samples: www.ugisd.org

INAPPROPRIATE USES. Using the resources for any illegal purpose. • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. • Damaging technology resources or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable any Internet filtering device or antivirus software. • Encrypting communications to avoid security review. • Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone else when posting, transmitting, or receiving messages. • Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. • Using resources to engage in conduct that harasses or bullies others. • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying cyberbullying and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. • Using inappropriate language such as swear words, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themself, such as addresses and phone numbers. • Responding (if student) or permitting a student to respond (if an employee or other non-student) to requests for personally identifying information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) to meet in person people met online. If a request for such a meeting is received by a student, it should be reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulation. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • Wasting school resources through the improper use of the District’s technology resources, including sending spam. • Gaining unauthorized access to restricted information or resources.

Appears in 1 contract

Samples: Acceptable Use Agreement

AutoNDA by SimpleDocs

INAPPROPRIATE USES. The following are some examples of inappropriate uses of technology resources that may result in loss of privileges or disciplinary action: • Using the resources for any illegal purpose, including threatening school safety. • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. • Damaging technology resources electronic communication systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable or bypass any Internet filtering device or antivirus software. • Encrypting communications to avoid security reviewdevice. • Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone else when posting, transmitting, or receiving messages. • Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. • Using resources to engage in conduct that harasses or bullies others. • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying cyberbullying and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. • Using inappropriate language such as swear wordscursing, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themselfyourself or others, such as addresses and addresses, phone numbers. • Responding (if student) , or permitting a student to respond (if an employee photographs without permission, or other non-student) responding to requests for personally identifying identifiable information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) appointments to meet in person people met online. If a request for such a meeting is received by a studentreceived, it should be immediately reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulationadministrator. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • Wasting school resources through the improper use of the District’s technology resources, including sending spam. • Gaining Downloading unauthorized applications or software or gaining unauthorized access to restricted information or resources. REPORTING VIOLATIONS • You must immediately report any known violation of the District’s applicable policies, Internet safety plan, or acceptable use guidelines to a supervising teacher, administrator or the technology coordinator. • You must report to a supervising teacher or administrator or the technology coordinator any requests for personally identifiable information or contact from unknown individuals, as well as any content or communication that is abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. I understand that my use of the District’s technology resources is not private and that the District will monitor my activity. I have read the District’s technology resources policy, associated administrative regulations, and this user agreement and agree to abide by their provisions, including the District’s guidelines for appropriate online behavior and use of social networking websites. I understand that violation of these provisions may result in suspension or revocation of access to the District’s technology resources or other disciplinary action in accordance with the Student Code of Conduct. I understand that this user agreement must be renewed each school year. I have read the District’s technology resources policy, associated administrative regulations, and this user agreement. In consideration for the privilege of my child using the District’s technology resources, I hereby release the District, its operators, and any institutions with which they are affiliated from any and all claims and damages of any nature arising from my child’s use of, or inability to use, these resources, including, without limitation, the type of damage identified in the District’s policy and administrative regulations. I understand that my child’s use of the District’s technology resources is not private and that the District will monitor my child’s activity. I understand that the District uses certain cloud-based (online) applications, meaning applications such as Google Apps for Education, online textbooks, Google Classroom, and other educational programs that allow authorized individuals to access student information, including assignments and grades, through the Internet for school-related purposes. I give permission for my child to access the District’s technology resources, including District-approved online applications, and certify that the information contained on this form is correct. ADDENDUM ADDRESSING STUDENT USE OF PERSONAL TELECOMMUNICATIONS OR OTHER ELECTRONIC DEVICES FOR INSTRUCTIONAL PURPOSES WHILE ON CAMPUS The District permits use of personal telecommunications or other electronic devices by students for instructional purposes while on campus.

Appears in 1 contract

Samples: Student Agreement

INAPPROPRIATE USES. The following are some examples of inappropriate uses of technology resources that may result in loss of privileges or disciplinary action: • Using the resources for any illegal purpose, including threatening school safety. • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy. • Damaging technology resources electronic communication systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable. • Attempting to gain access to locations on networks where specific privileges have not been given. • Disabling or attempting to disable or bypass any Internet filtering device or antivirus software. • Encrypting communications to avoid security reviewdevice. • Using someone’s account without permission. • Using electronic resources in such a way that would disrupt their use by others. • Bulk or mass emailing, unless approved by the Technology Department. • Downloading software on district hardware without permission from the Technology Department. • Pretending to be someone else when posting, transmitting, or receiving messages. • Attempting to read, delete, copy, modify, or interfere with another user’s posting, transmittal, or receipt of electronic media. • Using resources to engage in conduct that harasses or bullies others. • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyber- bullying cyberbullying and “sexting.” • Using e-mail or Web sites to engage in or encourage illegal behavior or to threaten school safety. • Using inappropriate language such as swear wordscursing, vulgarity, ethnic or racial slurs, and any other inflammatory language. • Posting (if student) or permitting a student to post (if an employee or other non-student) personal information about a student, including themselfyourself or others, such as addresses and addresses, phone numbers. • Responding (if student) , or permitting a student to respond (if an employee photographs without permission, or other non-student) responding to requests for personally identifying identifiable information or contact from unknown individuals. • Making (if student) or permitting a student to make (if an employee or other non-student) an appointment(s) appointments to meet in person people met online. If a request for such a meeting is received by a studentreceived, it should be immediately reported to a teacher or administrator immediately. • Posting or transmitting pictures of other students without obtaining prior permission from all individuals depicted or from parents of depicted students who are under the age of 18 – unless otherwise permitted by law, policy, or regulationadministrator. • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder. All communications and information accessible via the District’s technology resources should be assumed to be copyrighted unless otherwise stated. • Wasting school resources through the improper use of the District’s technology resources, including sending spam. • Gaining Downloading unauthorized applications or software or gaining unauthorized access to restricted information or resources. REPORTING VIOLATIONS • You must immediately report any known violation of the District’s applicable policies, Internet safety plan, or acceptable use guidelines to a supervising teacher, administrator or the technology coordinator. • You must report to a supervising teacher or administrator or the technology coordinator any requests for personally identifiable information or contact from unknown individuals, as well as any content or communication that is abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. STUDENT SIGNATURE PRINT NAME I understand that my use of the District’s technology resources is not private and that the District will monitor my activity. I have read the District’s technology resources policy, associated administrative regulations, and this user agreement and agree to abide by their provisions, including the District’s guidelines for appropriate online behavior and use of social networking websites. I understand that violation of these provisions may result in suspension or revocation of access to the District’s technology resources or other disciplinary action in accordance with the Student Code of Conduct. I understand that this user agreement must be renewed each school year. PARENT SIGNATURE PRINT NAME I have read the District’s technology resources policy, associated administrative regulations, and this user agreement. In consideration for the privilege of my child using the District’s technology resources, I hereby release the District, its operators, and any institutions with which they are affiliated from any and all claims and damages of any nature arising from my child’s use of, or inability to use, these resources, including, without limitation, the type of damage identified in the District’s policy and administrative regulations. I understand that my child’s use of the District’s technology resources is not private and that the District will monitor my child’s activity. I understand that the District uses certain cloud-based (online) applications, meaning applications such as Google Apps for Education, online textbooks, Google Classroom, and other educational programs that allow authorized individuals to access student information, including assignments and grades, through the Internet for school-related purposes. I give permission for my child to access the District’s technology resources, including District-approved online applications, and certify that the information contained on this form is correct. ADDENDUM ADDRESSING STUDENT USE OF PERSONAL TELECOMMUNICATIONS OR OTHER ELECTRONIC DEVICES FOR INSTRUCTIONAL PURPOSES WHILE ON CAMPUS The District permits use of personal telecommunications or other electronic devices by students for instructional purposes while on campus.

Appears in 1 contract

Samples: Student Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.