Pupil Acceptable Use Agreement Sample Clauses

Pupil Acceptable Use Agreement. As a parent/guardian, I will ensure my child(ren) have read and understood the following requirements: • I will only use a computer when supervised by an adult. • I will only use ICT in school for school purposes. • I will not download or install software on school equipment. • I will only use my school email address. • I will not tell other people my ICT passwords. • I will only open email attachments from people I know, or my teacher has approved. • I will not bring in/use any form of portable storage devices such as a USB drive or portable hard drive. • I will make sure that all ICT communications with pupils and adults are responsible, polite and sensible. • I will be responsible for my behaviour when using the internet (this includes the resources I access and the language I use). • I will not deliberately search for, download or send material that could be unpleasant or offensive. If I accidently come across such material I will report it immediately to my teacher. • I will not give out any personal information such as my name, phone number or address. • I know that my use of ICT can be checked and that my parent/carer can be contacted if a member of school staff is concerned about my e-Safety. • I will not publish pictures of school peers without their permission. • I understand that these rules are designed to keep me safe, and that if they are not. followed school sanctions will be applied and my parent/carer may be contacted.
AutoNDA by SimpleDocs
Pupil Acceptable Use Agreement. I understand that I must use College ICT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the ICT systems and other users. For my own personal safety: • I understand that the College will monitor my use of the ICT systems, email and other digital communications. • I will not share my password, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating online. • I will not disclose or share personal information about myself or others when online. • If I arrange to meet people that I have only communicated with online, I will do so ina public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it online. I understand that everyone has equal rights to use technology as a resource and: • I understand that the College ICT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the College ICT systems for online gaming, online gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission from a member of staff to do so. • I will act as I expect others to act toward me: • I will respect otherswork and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. • I recognise that the College has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the College . • I will only use my personal hand held/external devices (mobile phones/USB devices etc.) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using College equipment. • I understand the risks and will not try to upload, d...
Pupil Acceptable Use Agreement. KS2 + secondary For my own personal safety: I will use the technology and resources appropriately: I will act as I expect others to act towards me: I understand that I am responsible for my actions, both in and out of school: Pupil Acceptable Use Agreement Form: KS2 / secondary Pupil name: Please complete the sections below to show that you have read, understood and agree to the rules included in the Acceptable Use Agreement.
Pupil Acceptable Use Agreement. As a parent/guardian, I will ensure my child(ren) have read and understood the following requirements:
Pupil Acceptable Use Agreement. As pupils in the school, we would ask all pupils to read and understand the following to make sure that as a school, we can in the best position to guarantee each pupils safety.  ICT should only be used for school purposes  Email attachments should only be opened if from someone they school/pupil know or from those whom the teacher has approved  Computing passwords should not be given out to other pupils  I will only open/delete their own files  I will make sure that all computing contact with other children and adults is responsible, polite and sensible  I will not give out their own details such as name, phone numbers or home address  I will not arrange to meet someone online  I will be responsible for my own behaviour when using school ICT because it is understood that these rules are to keep everyone safe  Support the school approach to online safety and not deliberately upload or add any images, video or sounds or text that could upset any member of the school community  I am aware that my use of ICT can be checked and my parents/careers will be contacted if there are any concerns  Understand that if I break any of the Online safety rules, I could have my username or password blocked.
Pupil Acceptable Use Agreement. I understand that while I am a member of a school in the Xxxxxxx Diocesan Academies Trust I must use technology in a responsible way. • I will ask a teacher or suitable adult if I want to use the computers. • I will only use activities that a teacher or suitable adult has told or allowed me to use. • I will take care of the computer and other equipment. • I will ask for help from a teacher or suitable adult if I am not sure what to do or if I think I have done something wrong. • I will tell a teacher or suitable adult if I see something that upsets me on the screen. • I know that if I break the rules I might not be allowed to use a computer. I have read and understand the above and agree to follow these rules when: • I use the school systems and devices (both in and out of school). • I use my own equipment outside of school in a way that is related to me being a pupil of within the Xxxxxxx Diocesan Academies Trust e.g. communicating with other pupils or teachers, accessing school email, website etc. As the parent of guardian of the above pupil, I give permission for my child to have access to the internet and to ICT systems at school. I know that my child has signed this Acceptable Use Agreement and has received, or will receive, e-safety education to help them understand the importance of safe use of technology and the internet – both in and out of school. I understand that the school will take every reasonable precaution, including monitoring and filtering systems, to ensure that young people will be safe when they use the internet and ICT systems.
Pupil Acceptable Use Agreement. KS2 + secondary
AutoNDA by SimpleDocs
Pupil Acceptable Use Agreement. On the following pages we have copied, for the information of parents and carers, the Pupil Acceptable Use Agreement. Please note that children in KS1 will have a simplified version of the form explained to them before signing.

Related to Pupil Acceptable Use Agreement

  • Acceptable Use Policy Customer represents, warrants and covenants that Customer will comply with Markforged’s acceptable use policy, as set forth in clauses (a)-(d) below (the “Acceptable Use Policy”). (a) Customer will not use the Markforged Technology to collect, upload, transmit, display, or distribute any of Customer Content (i) that violates any third-party right, including any copyright, trademark, patent, trade secret, moral right, privacy right, right of publicity, or any other intellectual property or proprietary right; (ii) that is unlawful, harassing, abusive, tortious, threatening, harmful, invasive of another’s privacy, vulgar, defamatory, false, intentionally misleading, trade libelous, pornographic, sexually explicit, obscene, patently offensive, promotes racism, bigotry, hatred, or physical harm of any kind against any group or individual, promotes illegal activities or contributes to the creation of weapons, illegal materials, or is otherwise objectionable; (iii) that is harmful to minors in any way; (iv) to engage in fraudulent activity (including impersonating another person or entity, or submitting misleading or false declarations concerning Customer’s affiliation with a person or entity, or use proxy or anonymizing servers, or falsify headers or manipulate identifiers or addresses in any other way for the purpose of concealing the origin of any data sent via the Markforged Technology) or perpetrate a hoax or engage in phishing schemes or forgery or other similar falsification or manipulation of data; or (v) that is in violation of any law, regulation, or obligations or restrictions imposed by any third party. (b) Customer will not (i) modify, alter, tamper with, repair, translate, transmit, adapt, arrange, or create derivative works based on the Markforged Technology, except as expressly permitted herein; (ii) decompile, disassemble, disassociate, decrypt, extract, reverse compile or otherwise reverse engineer the Markforged Technology or any component thereof, or otherwise attempt to decipher the source code, algorithms, methods, structure, interfaces, protocols, messaging or techniques used or embodied in the Markforged Technology or any component thereof, except and only to the extent required by applicable law; (iii) distribute, rent, loan, lease, sell, resell, sublicense, convey, publicly display, publicly perform, exploit or otherwise make the Markforged Technology available for use by others in any time-sharing, service bureau or similar arrangement; (iv) remove, alter, or obscure any copyright, trademark, confidentiality or other proprietary notices, labels or marks from, on or pertaining to the Markforged Technology; or (v) use the Markforged Technology for any other benchmarking or competitive purposes or attempt to create similar products or services through use of the Markforged Technology. (c) Customer will not use the Markforged Technology to: (i) upload, transmit, or distribute any computer viruses, worms, or any software intended to damage or alter a computer system or data; (ii) utilize any equipment, device, software, or other means to (or designed to) circumvent or remove any form of technical protection used by Markforged in connection with the Markforged Technology; (iii) interfere with or disrupt the Markforged Technology or servers or networks used by Markforged to provide the Markforged Technology; (iv) use the Markforged Technology to perform any stress, vulnerability, penetration, availability, or performance testing on, or otherwise attempt to access in a manner not expressly permitted by Markforged, any network, system, server, or computer hosting the Markforged Technology; (v) interfere with, disrupt, or create an undue burden on servers or networks connected to the Markforged Technology or violate the regulations, policies, or procedures of such networks; (vi) attempt to gain unauthorized access to the Markforged Technology, other computer systems or networks connected to or used together with the Markforged Technology, through password mining or other means; or (vii) access or use the Markforged Technology. (d) Customer will not use the Markforged Technology (i) in connection with any military operations or the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other situations in which the failure of the Markforged Technology could lead to death, personal injury, or physical property or environmental damage; (ii) to experiment with ordnance or collect, upload, transmit, display, print, extrude, deposit or distribute any of Customer Content that contributes to the creation or modification of any firearm slide, lower, upper, upper receiver, lower receiver, barrel, bolt, or any other firearm or ordnance component, in whole or in part, that is capable of containing pressures in excess of 500 PSI; or (iii) in any manner or for any purpose other than for the Intended Use and as expressly permitted by this Agreement and any Documentation.

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • ACCEPTABLE USE RESTRICTIONS You must: • not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these terms, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, such as viruses, or harmful data, into the App, any Service or any operating system; • not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service, including by the submission of any material (to the extent that such use is not licensed by these terms); • not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; • not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and • not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • Service Level Agreement 6.1 NCR Voyix will use commercially reasonable efforts to make the Service available to you at or above the Availability Rate set forth at xxxxx://xxx.xxx.xxx/support/aloha-sla. If NCR Voyix does not meet the Availability Rate, you are entitled to request a service-level credit subject to the terms of this Agreement. This credit is calculated as a percentage of the monthly recurring bill (or monthly pro rata share of billing, if billing does not occur monthly) for the Service for the month in which the Availability Rate was not met. The Availability Rate is determined by: (a) dividing the total number of valid outage minutes in a calendar month by the total number of minutes in that month; (b) subtracting that quotient from 1.00; (c) multiplying that difference by 100; and (d) rounding that result to two decimal places in accordance with standard rounding conventions. The number of outage minutes per day for a given service is determined by the lesser of the number of outage minutes. 6.2 Unavailability due to other conditions or caused by factors outside of NCR Voyix’s reasonable control will not be included in the calculation of the Availability Rate. Further, the following are expressly excluded from the calculation of the Availability Rate: (a) service unavailability affecting services or application program interfaces that are not used by you; (b) cases where fail-over to another data center is available but not utilized; (c) transient time-outs, required re-tries, or slower-than-normal response caused by factors outside of NCR Voyix’s reasonable control; (d) Scheduled Downtime, including maintenance and upgrades; (e) force majeure; (f) transmission or communications outages outside the NCR Voyix- controlled environment; (g) store-level down-time caused by factors outside of NCR Voyix’s reasonable control; (h) outages attributable to services, hardware, or software not provided by NCR Voyix, including, but not limited to, issues resulting from inadequate bandwidth or related to third-party software or services; (i) use of the Service in a manner inconsistent with the documentation for the application program interface or the NCR Voyix Product; (j) your Point of Sale (“POS”) failure or the failure to properly maintain the POS environment, including updating the POS firmware or version of the software running on the POS as recommended by either NCR Voyix, a third-party POS reseller or servicer; and (k) issues related to third party domain name system (“DNS”) errors or failures. 6.3 To obtain a service-level credit, you must submit a claim by contacting NCR Voyix through the website at xxxxx://xxx.xxx.xxx/support/aloha-sla Your failure to provide the claim and other information will disqualify you from receiving a credit. NCR Voyix must receive claims within 60 days from the last day of the impacted month. After that date, claims are considered waived and will be refused. You must be in compliance with the Agreement in order to be eligible for a service-level credit. You may not unilaterally offset for any performance or availability issues any amount owed to NCR Voyix. If multiple Services experience an outage in a given month, the total credit for that month will be the highest credit allowed for any single Service which failed; there is no stacking of credits. 6.4 The remedies set forth in the Section are your sole and exclusive remedies for performance or availability issues affecting the Services, including any failure by NCR Voyix to achieve the Availability Rate.

  • Stop Work Order (a) NYSERDA may at any time, by written Order to the Contractor, require the Contractor to stop all or any part of the Work called for by this Agreement for a period of up to ninety (90) days after the Stop Work Order is delivered to the Contractor, and for any further period to which the parties may agree. Any such order shall be specifically identified as a Stop Work Order issued pursuant to this Section. Upon receipt of such an Order, the Contractor shall forthwith comply with its terms and take all reasonable steps to minimize the incurrence of costs allocable to the Work covered by the Order during the period of work stoppage consistent with public health and safety. Within a period of ninety (90) days after a Stop Work Order is delivered to the Contractor, or within any extension of that period to which the parties shall have agreed, NYSERDA shall either: (i) by written notice to the Contractor, cancel the Stop Work Order, which shall be effective as provided in such cancellation notice, or if not specified therein, upon receipt by the Contractor, or (ii) terminate the Work covered by such order as provided in the Termination Section of this Agreement. (b) If a Stop Work Order issued under this Section is cancelled or the period of the Order or any extension thereof expires, the Contractor shall resume Work. An equitable adjustment shall be made in the delivery schedule, the estimated cost, the fee, if any, or a combination thereof, and in any other provisions of the Agreement that may be affected, and the Agreement shall be modified in writing accordingly, if: (i) the Stop Work Order results in an increase in the time required for, or in the Contractor’s cost properly allocable to, the performance of any part of this Agreement, and (ii) the Contractor asserts a claim for such adjustments within 30 days after the end of the period of Work stoppage; provided that, if NYSERDA decides the facts justify such action, NYSERDA may receive and act upon any such claim asserted at any time prior to final payment under this Agreement. (c) If a Stop Work Order is not cancelled and the Work covered by such Order is terminated, the reasonable costs resulting from the Stop Work Order shall be allowed by equitable adjustment or otherwise. (d) Notwithstanding the provisions of this Section 12.01, the maximum amount payable by NYSERDA to the Contractor pursuant to this Section 12.01 shall not be increased or deemed to be increased except by specific written amendment hereto.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

  • Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!