Unacceptable Use Sample Clauses

Unacceptable Use. Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time....
AutoNDA by SimpleDocs
Unacceptable Use. I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: • Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination • Any illegal conduct, or statements which are deemed to be advocating illegal activity • Activity which defames or disparages the school, or risks bringing the school into disrepute • Causing intentional damage to ICT facilities or materials • Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.
Unacceptable Use. The user is responsible for the user's actions and activities involving the network. Some examples of unacceptable uses are given below. The list is not intended to be exhaustive. The Administration may periodically revise the concepts of acceptable and unacceptable use. These revisions will become part of this document.
Unacceptable Use. Examples of activities which are NOT PERMITTED include (but are not limited to):
Unacceptable Use. 5.4.1 Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted material, violation of export restrictions, harassment, fraud, trafficking in obscene material, child sexual abuse imagery, drug dealing, and other illegal activities.
Unacceptable Use. The use of the network is a privilege, and not a right, which may be revoked at any time for inappropriate conduct as determined by the Lavaca School District. Such conduct would include, but not be limited to, the placing or viewing of unauthorized or unlawful information (data or graphics) on a system, the use of abusive or otherwise objectionable language in either public or private messages/data, the sending of messages/data that are likely to result in the loss of a recipient’s work or systems, and the sending of “chain letters” or “broadcast” messages to list or individuals. District computing resources cannot be used to intimidate or create an atmosphere of harassment based upon gender, race, religion, ethnic origin, creed, or sexual orientation. It is essential for each user on the network to recognize his/her responsibility in having access to vast services, sites, systems, and people. The user is ultimately responsible for his/her actions in accessing network services. Be sure to observe the acceptable use policy of other networks. What is acceptable use on the district network may not be acceptable on outside networks. It is not acceptable to use the network so as to interfere with or disrupt network users, services, or equipment. Disruptions include, but are not limited to, distribution of unsolicited advertising, propagation of computer worms or viruses and using the network to make unauthorized entry to any other machine/service accessible via the network. No one should deliberately attempt to degrade the performance of a computer system (including network resources) or to deprive authorized users of resource or access. Use of the network for recreational games is not acceptable. The opportunity to use District technology to access the Internet is a privilege and not a right. Students who misuse electronic devices or Internet access in any way will face disciplinary action. Misuse of the Internet includes but is not limited to: • Disabling or bypassing of security procedures, compromising, attempting to compromise, or defeating the district’s technology network security or Internet filtering software • The altering of data without authorization • Disclosing, using or disseminating passwords, whether the passwords are the student’s own or those of another student/faculty/community member to other students • Divulging personally identifying information about himself/herself or anyone else either on the Internet or in an email unless it is a nec...
AutoNDA by SimpleDocs
Unacceptable Use. Don’t use copyrighted material that we aren’t licensed to use. - Don’t use any Company data, account, or equipment for any purpose other than Company business. - Do not share your password or other authentication details with anyone, unless expressly authorized to do so. If you do share such information, only do so via sanctioned means (eg. LastPass). - Do not provide information about, or lists of, Staff to parties outside the Company.
Unacceptable Use. Using the guiding statement ofeducational purpose,” some specific examples of prohibited use are shown below. However, this policy does not attempt to demonstrate all unacceptable behaviors. Behaviors considered unacceptable may result in termination of Internet access and/or the general use of electronic resources provided by GLCS. Depending upon the severity of a user's inappropriate action(s), disciplinary action up to and including student expulsion may occur. The following examples are considered unacceptable: ➢ Sharing of Usernames and Passwords is not allowed. ➢ Providing personal information such as Name, Address, Phone Number or Gender is not safe and not allowed. ➢ Purchasing or selling of products and services by students is not allowed. ➢ Hiding or falsifying your identity is not acceptable. ➢ Bullying, harassing, intimidating, threatening or offensive language is not to be used. Electronic communications will not contain profanity, obscene comments, sexually explicit material, or expressions of bigotry, racism, or hatred. ➢ Plagiarism and copyright infringement are prohibited. Ideas or writings of others are not to be used without the permission of the author. ➢ Gaining unlawful access to another person’s resources or organizational resources as well as knowingly circumventing or trying to circumvent security measures is not allowed. ➢ Making malicious attempts to harm or destroy data of any person or GLCS resource is unlawful and not allowed.
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, netw...
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!