Unacceptable Use Sample Clauses

Unacceptable Use. Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time....
AutoNDA by SimpleDocs
Unacceptable Use. I am aware that the school monitors the pupil’s activity on this device. I agree that my child will not carry out any activity that constitutes ‘unacceptable use’. This includes, but is not limited to the following: ● Using ICT or the internet to bully or harass someone else, or to promote unlawful discrimination ● Any illegal conduct, or statements which are deemed to be advocating illegal activity ● Activity which defames or disparages the school, or risks bringing the school into disrepute ● Causing intentional damage to ICT facilities or materials ● Using inappropriate or offensive language I accept that the school will sanction the pupil, in line with our Behaviour Policy, if the pupil engages in any of the above at any time.
Unacceptable Use. The user is responsible for the user's actions and activities involving the network. Some examples of unacceptable uses are given below. The list is not intended to be exhaustive. The Administration may periodically revise the concepts of acceptable and unacceptable use. These revisions will become part of this document.
Unacceptable Use. Examples of activities which are NOT PERMITTED include (but are not limited to):
Unacceptable Use. 5.4.1 Illegality in any form, including but not limited to activities such as unauthorized distribution or copying of copyrighted material, violation of export restrictions, harassment, fraud, trafficking in obscene material, child sexual abuse imagery, drug dealing, and other illegal activities.
Unacceptable Use. Unacceptable uses of technologies and the Internet include, but are not limited to: • Causing harm to others or damage to their property. • In the opinion of the Administration, producing and/or uploading content/videos/images, either through the use of the District network or from home computers, which seriously results in the disruption of the educational process or day-to-day operations of the school. In these cases, students will be asked to remove the content and may be subject to discipline. • Use for personal gain, unauthorized fundraising, commercial solicitation and compensation of any kind. • Activities incurring liability or cost by the District. The District will not be responsible for unauthorized financial obligations resulting from the use, or access to, Greenwich Public School’s network or the Internet. • Downloading, installing other unauthorized applications (including shareware or freeware) without permission or approval from a District representative. • Support or opposition for ballot measures, candidates and any other political activity, ,excluding specific activities supporting school-related projects. • Hacking, cracking, vandalizing, the introduction of viruses, worms, Trojan horses, time bombs and changes to hardware, software and monitoring tools. • Uses that jeopardize the security of student or staff access and of the computer network or other networks on the Internet, for example, disclosing or sharing your password with others or impersonating another user. • Unauthorized access to other district computers, networks and information systems. • Using another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating or otherwise using his/her access to the network or the Internet. • Xxxxxxxxxxxxx, hate mail, defamation, harassment of any kind, discriminatory jokes and remarks. • The sending, sharing, viewing or possessing pictures, emails or other material of a sexual nature in electronic or any other form on a cell phone or other electronic device is prohibited in the school setting. • Information posted, sent or stored online that could endanger others (e.g., bomb construction, drug manufacturing). • Accessing, uploading, downloading, storage and/or distribution of obscene, pornographic or sexually explicit material. • Attaching unauthorized equipment to the network. Any such equipment will be confiscated. • Participating in blogs, wikis, bulletin boar...
AutoNDA by SimpleDocs
Unacceptable Use. Don’t use copyrighted material that we aren’t licensed to use. - Don’t use any Company data, account, or equipment for any purpose other than Company business. - Do not share your password or other authentication details with anyone, unless expressly authorized to do so. If you do share such information, only do so via sanctioned means (eg. LastPass). - Do not provide information about, or lists of, Staff to parties outside the Company.
Unacceptable Use. Using the guiding statement ofeducational purpose,” some specific examples of prohibited use are shown below. However, this policy does not attempt to demonstrate all unacceptable behaviors. Behaviors considered unacceptable may result in termination of Internet access and/or the general use of electronic resources provided by GLCS. Depending upon the severity of a user's inappropriate action(s), disciplinary action up to and including student expulsion may occur. The following examples are considered unacceptable: ➢ Sharing of Usernames and Passwords is not allowed. ➢ Providing personal information such as Name, Address, Phone Number or Gender is not safe and not allowed. ➢ Purchasing or selling of products and services by students is not allowed. ➢ Hiding or falsifying your identity is not acceptable. ➢ Bullying, harassing, intimidating, threatening or offensive language is not to be used. Electronic communications will not contain profanity, obscene comments, sexually explicit material, or expressions of bigotry, racism, or hatred. ➢ Plagiarism and copyright infringement are prohibited. Ideas or writings of others are not to be used without the permission of the author. ➢ Gaining unlawful access to another person’s resources or organizational resources as well as knowingly circumventing or trying to circumvent security measures is not allowed. ➢ Making malicious attempts to harm or destroy data of any person or GLCS resource is unlawful and not allowed.
Unacceptable Use. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: ❑ Using the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations. ❑ Copying or downloading copyrighted material on any system connected to the school system's hardware/software without the owner's permission. Only the owner(s) or individuals specifically authorized by the owner(s) may copy or download copyrighted material to the system. School purchased software may not be copied for personal use. ❑ Students will not use district computers and laptops to copy or download copyrighted software, music or images, or for other violation of copyright laws. Peer-to-peer, file-sharing, torrent software may not be installed on a school system computer or laptop. ❑ Copying, printing or downloading copyrighted material for the users own use without the owner's permission. Users may redistribute copyrighted programs only with the owner’s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures. This includes the district contracted photographer. ❑ Product advertisement or political lobbying is prohibited. ❑ Vandalism. Vandalism is defined as any malicious attempt to harm or destroy data of another user, the network or the Internet. This includes, but is not limited to, creating and/or uploading or downloading viruses, disconnect or disassemble any network or computer component. ❑ Using or attempting to use the network while privileges are suspended or revoked. ❑ Using the computer of a teacher, administrator, or other staff member without permission or supervision. ❑ Use of technology resources in such a way that you would disrupt other users (sounds and/or excessive bandwidth usage, e.g., radio/audio streaming, video streaming). ❑ Provide another student with user account information or passwords ❑ Unauthorized interception of electronic communications and other wiretapping, including electronic mail (The Electronic Communications Privacy Act 18 USC 2701-2709) ❑ Accessing, monitoring, and use of personal websites. ❑ Accessing, monitoring, and use of personal networks. ❑ Bypassing the firewall and bypass and attempt to circumvent network security, virus protection, netw...
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!