Monitoring by the school. 16.1 The school may monitor traffic and material sent and received using the school’s technology infrastructures. 16.2 The school reserves the right to deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email. 16.3 Users must not attempt to circumvent filtering or monitoring.
Appears in 3 contracts
Samples: Cybersafety Acceptable Use Agreement, Cybersafety Use Agreement, Cybersafety Use Agreement
Monitoring by the school. 16.1 The school may monitor traffic and material sent and received using the school’s technology ICT infrastructures.
16.2 The school reserves the right to deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
16.3 Users must not attempt to circumvent filtering or monitoring.
Appears in 1 contract
Samples: Cybersafety Use Agreement
Monitoring by the school. 16.1 The school may monitor traffic and material sent and received using the school’s 's technology infrastructures.
16.2 The school reserves the right to deploy filtering and/or monitoring software where appropriate to restrict access to certain sites and data, including email.
16.3 Users must not attempt to circumvent filtering or monitoring.
Appears in 1 contract
Samples: Cybersafety Use Agreement