NETIQUETTE and APPROPRIATE USE GUIDELINES Sample Clauses

NETIQUETTE and APPROPRIATE USE GUIDELINES. NETWORK RESOURCES - The use of the network is a privilege, not a right, and may be revoked if abused. Faculty/staff are personally responsible for his/her actions when utilizing the school’s computer resources. PRIVACY – Network storage areas are the property of the school district. The Network Administrator may review any storage area of the school network or email to maintain system integrity and to insure that faculty/staff are using the system responsibly. No one can claim a right to privacy or unrestricted speech in the use of the District’s systems. PERSONAL USE - Limited personal use is permitted as long as this does not increase the cost to the District or interfere with the operations of the network or with the performance of the employee’s duties. Use of the district’s computer (i.e. laptop), at home, can become a potential risk for viruses and spyware into the school network. Please use extreme caution when using district resources at home. COPYING/DOWNLOADING – Faculty/Staff are NOT permitted to download or install any software, shareware, or freeware onto the school’s computers (webshots, gator, yahoo messenger, kazaa, weatherbug, limewire, spybot, toolbars, screen savers, etc.) Faculty/Staff are NOT permitted to intrude into others’ files. INAPPROPRIATE MATERIALS OR LANGUAGE – Faculty/Staff are NOT permitted to transmit, retrieve or store materials that are discriminatory, harassing, obscene, pornographic, or inappropriate. Despite our best efforts and beyond the limits of filtering technology, you may run across areas of adult content and some material you might find objectionable for the educational setting. We ask that you report these websites to the technology department to include in the filtering process. Faculty or staff should not seek to access sites that are inappropriate for the public school environment. The use of district online systems for personal gain, political lobbying or any other purpose which is illegal or against district policy or contrary to the district’s best interest is NOT permitted. ELECTRONIC MAIL – While electronic mail can be a valuable tool, it is impossible to guarantee that it will be private. Deleted files can be undeleted. Do not send messages that are abusive, threatening, harassing, obscene, sexually oriented, discriminatory, damaging, illegal, false, or contain profanity. Do not send chain letters, virus warnings, urban legends or other unsubstantiated scares. Use the forward button with care (copy/pa...
AutoNDA by SimpleDocs

Related to NETIQUETTE and APPROPRIATE USE GUIDELINES

  • Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • HIV/AIDS Model Workplace Guidelines Grantee will:

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • INFORMATION AND APPLICATIONS POLICY LANGUAGE For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

Time is Money Join Law Insider Premium to draft better contracts faster.