Network Policies Clause Samples
The Network Policies clause defines the rules and requirements governing the use, access, and management of a network within an organization or between contracting parties. It typically outlines acceptable use, security protocols, and restrictions on network resources, such as prohibiting unauthorized access or mandating encryption for sensitive data transmissions. By establishing clear guidelines for network behavior, this clause helps protect the integrity and security of the network, reducing the risk of data breaches and ensuring compliance with organizational or legal standards.
Network Policies. All users must abide by the rules of network etiquette which include:
1. Use appropriate language. Do not use profanity, obscenity or other language which may be offensive to other users. Illegal activities are strictly forbidden.
2. Do not reveal your personal home address or phone number or any personally identifiable information (including educational records) of students or colleagues.
3. Note that electronic mail (e-mail) is not guaranteed to be private. The Technology Director has access to all messages. Any messages regarding illegal activities will be reported to the authorities.
4. Use of the computer and/or network is not for financial gain or for any commercial or illegal activity.
5. The network should not be used in such a way that it disrupts the use of the network by others.
6. All communications and information accessible via the network should be assumed to be property of the District.
7. Rules and regulations of online etiquette are subject to change by the administration and will be published accordingly.
8. The user in whose name an online service account is issued is responsible for its proper use at all times. Users shall keep personal account numbers and passwords private. They shall use this system only under the account numbers issued by the District unless authorized by the Building Principal, Technology Director, Superintendent or Supervisor.
9. The system shall be used only for the purposes related to education or administration. Commercial, political and/or personal use of the system is strictly prohibited. The administration reserves the right to monitor any computer activity and online communications for improper use.
10. Users shall not use the system to encourage the use of drugs, alcohol or tobacco nor shall they promote unethical practices or any activity prohibited by law or Board Policy.
11. Users shall not view, download or transmit material that is threatening, obscene, disruptive or sexually explicit or that could be construed as harassment, bullying or disparagement of others based on their race, color, national origin, citizenship status, sex, sexual orientation, age, disability, religion, economic status, military status, political beliefs or any other personal or physical characteristics.
12. Copyrighted material may not be placed on the system without the author’s permission.
13. Vandalism results in the cancellation of user privileges. Vandalism includes uploading/downloading any inappropriate material, creatin...
Network Policies. Anonymous connections must be disabled. Network listening services not provided by software on the approved list must be stopped or uninstalled. Minimum session security for NTLM SSP based (including secure RPC) clients: • Require message integrity • Require message confidentiality • Require NTLMv2 session security • Require 128-bit encryption
Network Policies. As part of the implementation of the Transition Plan, Network Operator shall in consultation with MassTech review and update existing Network Policies, and where necessary, develop new ones. Except as provided in Section 4.6, within one hundred and twenty (120) Days after the Effective Date, Network Operator shall propose new or revised Network Policies to MassTech for approval, which shall go into effect as of the Commencement Date. The Network Policies shall reflect and be consistent with the requirements and policy objectives of the RFP and MassTech. The updated and approved Network Policies shall be compiled and set out in Exhibit J.
