Responsible Use of Technology Sample Clauses

Responsible Use of Technology. It is important that users understand their responsibilities and conduct themselves as responsible learners at all times. The following statements represent the students’ agreement about the responsible use of technology:
AutoNDA by SimpleDocs
Responsible Use of Technology. The use of computers and network services is a privilege, not a right. Inappropriate use will result in a loss of those privileges and / or other disciplinary action. Students will be held responsible for their actions and activities while using technology as SJLC according to the following guidelines:
Responsible Use of Technology. The Xxxx Xxxxx School Corporation believes that the use of computer networked services, email, and the Internet have become, if used appropriately, an integral part of an engaging, student‐centered, and collaborative learning environment. It is understood that all of our computer networked services are provided exclusively for educational purposes. The Xxxx Xxxxx School Corporation filters all internet traffic for the purpose of safeguarding staff and students from harmful content. The Xxxx Xxxxx School Corporation also provides supervision and education related to appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms, and regarding cyberbullying awareness and response. However, it is still the responsibility of all computer users to make sure they comply with providing a safe and secure learning environment when using technology. The District encourages parents/guardians to supervise their child(ren) when using technologies from home. CLEAR highlights the important points contained in Xxxx Xxxxx School Corporation Responsible Use Policy. CLEAR: Considerate, Legal & Ethical, Appropriate and Responsible Considerate: People in our community reflect a diverse set of customs, values and points of view. Digital communication should be respectful, polite and considerate of others. Legal & Ethical: Respect copyright laws by copying media including text, music and videos only with permission and by crediting and citing the source where the information was found. It is a good general practice to link to others’ work rather than reproduce it. Respect the privacy of others, ask permission before taking photographs, video or audio recordings. Illegally copied or downloaded software, files, pictures, music or games may not be used on JGSC computers. Appropriate: School technology is used for educational purposes and only appropriate words and images may be used and viewed. If inappropriate material are viewed or received, it is the responsibility of the recipient to delete them. Responsible: Ensure that care is taken with all hardware, software, shared resources (i.e. printers, scanners) and use of the school network, so as to prevent damage or misuse whether intentional or not; your actions should not inhibit the work of others. Personal information and passwords will be kept private. DIGITAL CITIZENSHIP Students must follow the six conditions of being a good digital citizen: 1 RESPECT YOURSELF. I wil...
Responsible Use of Technology. It is important that users understand their responsibilities and conduct themselves as responsible learners at all times. The following statements represent the students’ agreement about the responsible use of technology: I Will: • Bring any school-issued device to school fully charged each day. • Follow MCS and building policies, rules, and regulations. • Be a responsible Digital Citizen. o Keep private information private. (Password and identity are not to be shared with anyone other than parents/guardians.) o Treat others with respect both online and offline. o Use the device for school-related purposes during school hours. o Credit my sources when I am using other people’s information, images, or other material. o Respect the work of other students and not copy, alter or damage work that is not mine. • Use cords, cables, and external ports with care. • Keep any school-issued device protected from poor weather, secured and attended to at all times, and always inside of the school-issued case. • Use school technology and resources only for educational purposes. I Will Not: • Share my password with others. • Place food or drink on or near any device. • Store the device at home near pets or liquids. • Place stickers, labels or any drawings on the device or case. • Place heavy objects on top of the device. i.e. textbook, backpack, etc. • Trade or swap my device with any other students. • Access or attempt to access other people’s files, private communications, schoolwork, programs, or resources without their permission. • Use inappropriate language or pictures. • Use any form of electronic communication to harass, intimidate, ridicule, or otherwise harm others. • Take pictures and/or record audio/video without the consent of a staff member. • Search for, possess, forward, send, read, view, or copy inappropriate pictures or information. • Damage, change, or tamper with the hardware or network in any way. • Use any other personal electronic devices, including cell phones, without specific approval from teachers or administrators.
Responsible Use of Technology. (To be completed by parent or legal guardian on behalf of student) STUDENT NAME: SCHOOL: _ XXX is committed to educating responsible citizens who RESPECT, EDUCATE, and PROTECT themselves and others. As the parent or legal guardian of the student listed above, I will instruct and educate my child to: • Protect their personal identity, and not reveal any such information online • Avoid accessing, not create, nor forward inappropriate or offensive online material • Respect the privacy of others, and not share their personal information online • Obtain permission of individual(s) before sharing any photographs, or video about them • Not use technologies to degrade, defame, bully, or harass others • Follow copyright laws and fair use guidelines for electronic content • Not post, or download illegal software, music, movies, or content • Report any concerns, misuse, or abuse of technology to a teacher or school designate • Take full responsibility for, and respectfully use any technology available to them • Use personal technology only when permission is granted, and keep it stored away when not in use • Connect only to school-approved Wi-Fi sources or networks • Turn off all peer-to-peer software (music, video, file-sharing) when using personal technology at school
Responsible Use of Technology. INTRODUCTION  Dedicated to the teaching mission of the Catholic Church, the schools of the Archdiocese of Cincinnati are Xxxxxx-centered communities focused on faith formation, academic achievement, and personal growth.
Responsible Use of Technology. Hanover School Division is committed to educating responsible digital citizens who RESPECT, EDUCATE, and PROTECT themselves and others. When using HSD technology or personal devices, all students are required to: ● Take precautions to ensure personal privacy is protected (avoid sharing personal or identifying information online). ● Protect the privacy of others (do not share their personal information, images, or video without consent). ● Be respectful to all (do not use technology to degrade, defame, bully, or harass others). ● Avoid inappropriate or offensive online content (do not access, forward, or share). ● Abide by copyright laws and fair-use guidelines for electronic content. ● Do not post/download/share illegal software, music, movies, or content. ● Report any concerns, misuse, or abuse of technology to school personnel. ● Take full responsibility for, and respectfully use any technology provided. ● Use personal technology only when permission is granted, and keep it stored away when not in use. ● Turn off all peer-to-peer software when using personal technology at school (music, video, and file-sharing). ● Connect only to school approved Wi-Fi sources or networks. ● Cell phones and additional personal technology devices should not be brought to school unless the school principal has provided permission. PART B PARENT/GUARDIAN AGREEMENT
AutoNDA by SimpleDocs

Related to Responsible Use of Technology

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Patent/Copyright Materials/Proprietary Infringement Unless otherwise expressly provided in this Contract, Contractor shall be solely responsible for clearing the right to use any patented or copyrighted materials in the performance of this Contract. Contractor warrants that any software as modified through services provided hereunder will not infringe upon or violate any patent, proprietary right or trade secret right of any third party. Contractor agrees that, in accordance with the more specific requirement contained in paragraph 18 below, it shall indemnify, defend and hold County and County Indemnitees harmless from any and all such claims and be responsible for payment of all costs, damages, penalties and expenses related to or arising from such claim(s), including, but not limited to, attorney’s fees, costs and expenses.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Know-How The term “

Time is Money Join Law Insider Premium to draft better contracts faster.