Internet Acceptable Use Policy Sample Clauses

Internet Acceptable Use Policy. You agree not to use or to allow others to use the Service for illegal or inappropriate activities, including but not limited to: invading another person’s privacy; unlawfully using, possessing, posting, transmitting or disseminating obscene, profane or pornographic material; posting, transmitting, distributing or disseminating content that is unlawful, threatening, abusive, harassing, libelous, slanderous, defamatory or otherwise offensive or objectionable. You agree to comply with Frontier’s Acceptable Use Policy (AUP), which Frontier may modify at any time. The current AUP is available for review at the following address, subject to change: xxxxx://xxxxxxxx.xxx/~/media/corporate/policies/aup- residential.ashx Warranties and Limitation of Liability YOU ACKNOWLEDGE AND AGREE THAT THE SERVICE SUPPLIED HEREUNDER IS PROVIDED ON AN "AS IS" OR "AS AVAILABLE" BASIS, WITH ALL FAULTS. FRONTIER (AND ITS OFFICERS, EMPLOYEES, PARENT, SUBSIDIARIES, AND AFFILIATES) (COLLECTIVELY, THE "FRONTIER PARTIES"), ITS THIRD PARTY LICENSORS, PROVIDERS AND SUPPLIERS, DISCLAIM ANY AND ALL WARRANTIES AND CONDITIONS FOR THE SERVICE, WHETHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, NON-INFRINGEMENT, NON- INTERFERENCE, TITLE, COMPATIBILITY OF COMPUTER SYSTEMS, COMPATIBILITY OF SOFTWARE PROGRAMS, INTEGRATION, AND THOSE ARISING FROM COURSE OF DEALING, COURSE OF TRADE, OR ARISING UNDER STATUTE. ALSO, THERE IS NO WARRANTY OF WORKMANLIKE EFFORT OR LACK OF NEGLIGENCE. NO ADVICE OR INFORMATION GIVEN BY FRONTIER OR ITS REPRESENTATIVES SHALL CREATE A WARRANTY WITH RESPECT TO ADVICE PROVIDED. FRONTIER DOES NOT WARRANT OR GUARANTEE THAT SERVICE CAN BE PROVISIONED TO YOUR LOCATION, OR THAT PROVISIONING WILL OCCUR ACCORDING TO A SPECIFIED SCHEDULE, EVEN IF FRONTIER HAS ACCEPTED YOUR ORDER FOR SERVICE. THE PROVISIONING OF SERVICE IS SUBJECT TO NETWORK AVAILABILITY, CIRCUIT AVAILABILITY, LOOP LENGTH, THE CONDITION OF YOUR TELEPHONE LINE AND WIRING INSIDE YOUR LOCATION, AND YOUR COMPUTER/DEVICE CONFIGURATION AND CAPABILITIES, AMONG OTHER FACTORS. IN THE EVENT YOUR LINE IS NOT PROVISIONED FOR ANY REASON, NEITHER YOU NOR FRONTIER SHALL HAVE ANY DUTIES OR OBLIGATIONS UNDER THIS AGREEMENT (OTHER THAN YOUR OBLIGATION TO RETURN ANY FRONTIER- PROVIDED EQUIPMENT). FRONTIER DOES NOT WARRANT THAT THE SERVICE OR EQUIPMENT PROVIDED BY FRONTIER WILL PERFORM AT A PARTICULAR SPEED, BANDWIDTH OR DATA THROUGHPUT RATE, OR...
AutoNDA by SimpleDocs
Internet Acceptable Use Policy. Students are responsible for good behavior on school computer networks just as they are in a classroom or school hallway. Communications on the network are often public in nature. General school rules for behavior and communications apply. Students may have e-mail access for curriculum-related activities and communications under their teacher’s direct supervision using a classroom account. Network storage areas may be treated like school lockers. Network administrators may review files and communications to maintain system integrity and insure that users are using the system responsibly. Users should not expect that files stored on any server or computer would be private. At school, teachers will advise students as to the appropriateness of materials. Outside of school, families bear the same responsibility for such guidance as they exercise with information sources such as television, telephones, movies, radio and other potentially offensive media. Parent Initial Users have no privacy right to any data received or disseminated on the network and by utilizing these Xxxxx Xxxxxx-St. Xxxxxx High School systems they consent to VASJ’s right to audit all communications, files and documents. If a user acts inappropriately through the communications systems, Xxxxx Xxxxxx-St. Xxxxxx High School reserves the right to report such actions to any outside authorities and/or take appropriate internal disciplinary action. Examples of inappropriate use and activity includes, but is not limited to: • Sending or displaying offensive messages or pictures • Using violent, aggressive or obscene language • Xxxxxxxxx, insulting or attacking others • Damaging computers, computer systems or computer networks • Hacking or other unlawful activities • Violating copyright laws • Downloading information and files not relevant to curriculum-related activities • Accessing inappropriate web sites that have escaped Internet filtering • Attempting to or overriding Internet filtering systems • Violating privacy issues by: ⮚ posting personal contact information about themselves or other people ⮚ using another’s password ⮚ trespassing in another’s folders, work or files • Intentionally wasting limited resources • Employing the network for commercial purposes • Accessing personal e-mail accounts during school hours • Using social media for communications not related to classroom activities • Any other activity, use or content deemed by VASJ administration to be unacceptable within the school en...
Internet Acceptable Use Policy. All of the requirements, understandings, and obligations the GRSD “Internet Acceptable Use Policy” are incorporated and are made a part of this contract. Your signature on this document signifies your understanding and acceptance of said Internet Acceptable Use Policy. WEB PAGE and SOCIAL NETWORKS POLICY
Internet Acceptable Use Policy. All use of the Internet shall be consistent with St. Xxxx’s goal of promoting educational excellence by facilitating resource sharing, innovation, and communication. This authorization does not attempt to state all required or prescribed behavior by users. St. Mary’s School supports the use of computers and the Internet in its instructional program. This will allow the school to facilitate access to information, research, collaboration, and interpersonal communications. The use of computer hardware and software shall be consistent with the Catholic identity of our school, reinforce the curriculum, and reflect the varied instructional needs and learning styles of our students. Students and staff are expected to act in a responsible, ethical, and legal manner in accordance with the moral principles of the Catholic Church. Students and staff will also act according to the accepted rules of network etiquette as well as federal and state law. The availability of electronic information to students and staff does not imply endorsement of the content by Xx. Mary’s School. St. Mary’s School does not guarantee the accuracy of information received on the Internet. Additionally, St. Mary’s School shall not be responsible for any information that is retrieved via the Internet or information that may be lost, damaged, or unavailable when using its computers. To the greatest extent possible, users of the Internet will be protected from harassment as well as unwanted or unsolicited communication. Any user who receives threatening or unwelcoming communications should immediately bring them to the attention of a teacher or administrator. Users shall not reveal personal addresses or telephone numbers to other users on the network or the Internet.
Internet Acceptable Use Policy. The MAKE Gosport wi-fi and ethernet networks are a resource which are available to members at MAKE Gosport. Henceforth the services of both wired and wireless network access is described as “Wifi”. Our objectives for operating and managing the wi-fi network are to provide high quality, reliable service to our members; respect the privacy of our members; protect the security and integrity of our network and related systems; encourage responsible use of our network comply with applicable laws. Because the wi-fi is shared by many members, achievement of our objectives requires appropriate use by each member. Examples of prohibited uses of the Wifi are described below. The examples are guidelines and are not intended to be exhaustive. Illegal/ Criminal Activity The Wifi may not be used in connection with criminal or civil violations of laws, regulations, or other government requirements of any jurisdiction. Such violations include theft or infringement of copyrights, patents, trademarks, trade secrets, or other intellectual property, export control violations, fraud, forgery, pyramid or other prohibited business schemes; and theft, misappropriation, or unauthorised transmission or storage of funds, credit card information, personal information, or online services.
Internet Acceptable Use Policy. The purpose of this policy is to set forth policies and guidelines for acceptable use of the Internet.
Internet Acceptable Use Policy. This section of this Agreement comprises the CITIZENS TELEPHONE CORPORATION "Acceptable Use Policy" (AUP) as it exists the day that this Agreement between CITIZENS TELEPHONE CORPORATION and the Customer is entered into. As unsolicited commercial email (“UCE” or “spam”) and "hacking" technology develops at an alarming rate and is expected to continue to do so, CITIZENS TELEPHONE CORPORATION reserves the right to add, remove, or modify specific prohibitions from this section of this Document, consistent with applicable “net neutralityrules of the Federal Communications Commission (“FCC”). The Customer recognizes and agrees that the online AUP prohibitions, to be maintained by CITIZENS TELEPHONE CORPORATION and always available to all Customers and to the public as the company's web pages, supersede the prohibitions listed in this document. This and the online AUP apply to broadband Internet access service (the “Service”) provided by CITIZENS TELEPHONE CORPORATION to the Customer. ▪ Restrictions. Customer agrees and understands that the following restrictions are applied to the Service. If violated, the service may be suspended, restricted, or terminated without notice. Customer shall not do any of the following, or permit any third party under its control to do the following, and must include provisions in its service agreements for its customers and authorized users that restrict them from doing any of the following:
AutoNDA by SimpleDocs
Internet Acceptable Use Policy. Wayne County School District The Wayne County School District (WCSD) is pleased to offer to its students, faculty and staff access to the Internet in accordance with the terms and conditions of this policy. The Internet is an electronic highway connecting hundreds of thousands of computers and millions of individual users globally. This computer technology will help propel our schools through the communication age by allowing students and staff to access and to use resources from distant computers to communicate and to collaborate with other individuals and groups and to significantly expand their available information base.
Internet Acceptable Use Policy please return reply slip to the class teacher I the parent / legal guardian of in Grade have read and discussed the implications of the Internet Acceptable User Policy. My son / daughter has been made fully aware of the expectations and responsibilities linked to the privilege of using the school’s network, including that this privilege can be revoked if the terms are contravened. We both accept the terms of the document and the consequences involved in breaching this agreement. Signed: Pupil Parent / Legal Guardian Date Created 23/01/2015 11:54:00

Related to Internet Acceptable Use Policy

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Market Access 1. With respect to market access through the modes of supply identified in the "trade in services" definition of Article 104 (Definitions), each Party shall accord to services and service suppliers of the other Party treatment no less favourable than that provided for under the terms, limitations and conditions agreed and specified in its Schedule (7). 2. In sectors where market access commitments are undertaken, the measures which a Party shall not maintain or adopt either on the basis of a regional subdivision or on the basis of its entire territory, unless otherwise specified in its Schedule, are defined as: (a) limitations on the number of service suppliers whether in the form of numerical quotas, monopolies, exclusive service suppliers or the requirements of an economic needs test; (b) limitations on the total value of service transactions or assets in the form of numerical quotas or the requirement of an economic needs test; (c) limitations on the total number of service operations or on the total quantity of service output expressed in terms of designated numerical units in the form of quotas or the requirement of an economic needs test; (8) (d) limitations on the total number of natural persons that may be employed in a particular service sector or that a service supplier may employ and who are necessary for, and directly related to, the supply of a specific service in the form of numerical quotas or the requirement of an economic needs test; (e) measures which restrict or require specific types of legal entity or joint venture through which a service supplier may supply a service; or (f) limitations on the participation of foreign capital in terms of maximum percentage limit on foreign shareholding or the total value of individual or aggregate foreign investment.

  • CUSTOMER SERVICE ACCESS The Competitive Supplier agrees to provide, or cause to be provided, certain customer services to Participating Consumers. Such services shall be reasonably accessible to all Participating Consumers, shall be available during normal working hours, shall allow Participating Consumers to transact business they may have with the Competitive Supplier, and shall serve as a communications liaison among the Competitive Supplier, the Town, and the Local Distributor. A toll-free telephone number will be established by Competitive Supplier and be available for Participating Consumers to contact Competitive Supplier during normal business hours (9:00 A.M. - 5:00 P.M. Eastern Standard Time, Monday through Friday) to resolve concerns, answer questions and transact business with respect to the service received from Competitive Supplier. The Town will post program-related information on the Town’s website which will be available to Participating Consumers for general information, product and service information, and other purposes.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!