Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.
Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.
Acceptable Use Policy Customer represents, warrants and covenants that Customer will comply with Markforged’s acceptable use policy, as set forth in clauses (a)-(d) below (the “Acceptable Use Policy”). (a) Customer will not use the Markforged Technology to collect, upload, transmit, display, or distribute any of Customer Content (i) that violates any third-party right, including any copyright, trademark, patent, trade secret, moral right, privacy right, right of publicity, or any other intellectual property or proprietary right; (ii) that is unlawful, harassing, abusive, tortious, threatening, harmful, invasive of another’s privacy, vulgar, defamatory, false, intentionally misleading, trade libelous, pornographic, sexually explicit, obscene, patently offensive, promotes racism, bigotry, hatred, or physical harm of any kind against any group or individual, promotes illegal activities or contributes to the creation of weapons, illegal materials, or is otherwise objectionable; (iii) that is harmful to minors in any way; (iv) to engage in fraudulent activity (including impersonating another person or entity, or submitting misleading or false declarations concerning Customer’s affiliation with a person or entity, or use proxy or anonymizing servers, or falsify headers or manipulate identifiers or addresses in any other way for the purpose of concealing the origin of any data sent via the Markforged Technology) or perpetrate a hoax or engage in phishing schemes or forgery or other similar falsification or manipulation of data; or (v) that is in violation of any law, regulation, or obligations or restrictions imposed by any third party. (b) Customer will not (i) modify, alter, tamper with, repair, translate, transmit, adapt, arrange, or create derivative works based on the Markforged Technology, except as expressly permitted herein; (ii) decompile, disassemble, disassociate, decrypt, extract, reverse compile or otherwise reverse engineer the Markforged Technology or any component thereof, or otherwise attempt to decipher the source code, algorithms, methods, structure, interfaces, protocols, messaging or techniques used or embodied in the Markforged Technology or any component thereof, except and only to the extent required by applicable law; (iii) distribute, rent, loan, lease, sell, resell, sublicense, convey, publicly display, publicly perform, exploit or otherwise make the Markforged Technology available for use by others in any time-sharing, service bureau or similar arrangement; (iv) remove, alter, or obscure any copyright, trademark, confidentiality or other proprietary notices, labels or marks from, on or pertaining to the Markforged Technology; or (v) use the Markforged Technology for any other benchmarking or competitive purposes or attempt to create similar products or services through use of the Markforged Technology. (c) Customer will not use the Markforged Technology to: (i) upload, transmit, or distribute any computer viruses, worms, or any software intended to damage or alter a computer system or data; (ii) utilize any equipment, device, software, or other means to (or designed to) circumvent or remove any form of technical protection used by Markforged in connection with the Markforged Technology; (iii) interfere with or disrupt the Markforged Technology or servers or networks used by Markforged to provide the Markforged Technology; (iv) use the Markforged Technology to perform any stress, vulnerability, penetration, availability, or performance testing on, or otherwise attempt to access in a manner not expressly permitted by Markforged, any network, system, server, or computer hosting the Markforged Technology; (v) interfere with, disrupt, or create an undue burden on servers or networks connected to the Markforged Technology or violate the regulations, policies, or procedures of such networks; (vi) attempt to gain unauthorized access to the Markforged Technology, other computer systems or networks connected to or used together with the Markforged Technology, through password mining or other means; or (vii) access or use the Markforged Technology. (d) Customer will not use the Markforged Technology (i) in connection with any military operations or the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other situations in which the failure of the Markforged Technology could lead to death, personal injury, or physical property or environmental damage; (ii) to experiment with ordnance or collect, upload, transmit, display, print, extrude, deposit or distribute any of Customer Content that contributes to the creation or modification of any firearm slide, lower, upper, upper receiver, lower receiver, barrel, bolt, or any other firearm or ordnance component, in whole or in part, that is capable of containing pressures in excess of 500 PSI; or (iii) in any manner or for any purpose other than for the Intended Use and as expressly permitted by this Agreement and any Documentation.
ACCEPTABLE USE RESTRICTIONS You must: • not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with these terms, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, such as viruses, or harmful data, into the App, any Service or any operating system; • not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service, including by the submission of any material (to the extent that such use is not licensed by these terms); • not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; • not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and • not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.
Required Bonding Capacity Letter No response If proposing on Part 2, Vendor is required to upload a Bonding Capacity Letter from its surety, as described herein, at this location. Please see the attachment entitled "Instructions and Sample - Part 2 Required Bonding Capacity Letter" for complete instructions. . On Part 2, Vendor will be scored on the aggregate bonding capacity displayed in the accepted letter. Vendor must provide a current letter (issued on or after the first day of the month preceding the date on which the solicitation was posted) from its surety verifying Vendor’s bonding capacity as described herein. (Ex. if the solicitation/bid posted on February 4, 2022, the letter must be dated on or after January 1 2022. The letter must be issued from Vendor’s Surety companies, on surety company letterhead, must specify the maximum bonding capacity of the Vendor, and must be signed by an authorized representative of the surety company. The issuing surety must be authorized to do business in the State of Texas and must be listed on the Department of the Treasury's Listing of Approved Sureties (Department Circular 570).