Common use of Unacceptable Use Clause in Contracts

Unacceptable Use. Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 2 contracts

Samples: www.williamfarr.lincs.sch.uk, williamfan.ovw3.juniperwebsites.co.uk

AutoNDA by SimpleDocs

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant delegated member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 2 contracts

Samples: benshamgrovenurseryschool.org, www.wingate-nur.durham.sch.uk

Unacceptable Use. Unacceptable Includes but not limited to: ❖ Pornography (real-life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyberbullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software, or websites. The use of keylogging devices/software is prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the School-Wide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that Internet and technology resources is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members a standard part of the school community Connecting instructional process and is considered the same as using a textbook or any device other resource to the school’s ICT network without approval from authorised personnel Setting up any softwareenhance or deliver instruction. Furthermore, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gainI understand that my child may be issued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the schoolInternet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to restrict access to all inappropriate materials, and I will not hold the school system responsible if my child accesses or acquires such materials on the network. I accept responsibility for my child’s ICT facilities Causing intentional damage to compliance with the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised Acceptable Use Policy. I give my consent for school district personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school Using websites network. I have read to my child (or mechanisms to bypass they have read), and understand, and will abide by the school’s filtering or monitoring mechanisms Engaging Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use them appropriately and in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots accordance with Policy (such as ChatGPT and Google Bard) to generate text or imagery presented as original work10100/10226). This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. Unacceptable Includes but not limited to: ❖ Pornography (real life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyberbullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software or websites. The use of keylogging devices/software is prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting, or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the Schoolwide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on the Alleghany County Website. I understand that the use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that Internet and technology resources is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members a standard part of the school community Connecting instructional process and is considered the same as using a textbook or any device other resource to the school’s ICT network without approval from authorised personnel Setting up any softwareenhance or deliver instruction. Furthermore, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gainI understand that my child may be issued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the Internet and the use of school-owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to restrict access to all inappropriate materials, and I will not hold the school system responsible if my child accesses or acquires such materials on the network. I accept responsibility for my child’s ICT facilities Causing intentional damage to compliance with the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised Acceptable Use Policy. I give my consent for school district personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to monitor my child’s school-issued email account as well as my child’s internet activity on school-owned computers and the school Using websites network. I have read to my child (or mechanisms to bypass they have read), and understand, and will abide by the school’s filtering or monitoring mechanisms Engaging Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use them appropriately and in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots accordance with Policy (such as ChatGPT and Google Bard) to generate text or imagery presented as original work10100/10226). This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT and computing subject leader will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.holmesdale.surrey.sch.uk

Unacceptable Use. Unacceptable Includes but not limited to: ❖ Pornography (real life or cartoon) Pornography can be a felony offense and if so will be turned over to authorities. ➢ Possession ➢ Manufacturing – using a camera or creating pictures/movies ➢ Distributing – sending/sharing with others ❖ Images of Weapons ❖ Gang Related Files ❖ Bootleg movies or music ❖ Logging into a device/application using someone else’s login ❖ Cheating ❖ Using a device to plan a fight, cause harm or commit a crime ❖ Profanity directed to the faculty or staff ❖ Threats and/or cyber bullying ❖ Employing the network for commercial purposes, financial gain or fraud ❖ Attempting to access websites blocked by district policy including the use of proxy services, software or websites. The use of keylogging devices/software is prohibited. ❖ Violating copyright laws ❖ Bullying, harassing, insulting or attacking others Discipline Consequences will be as directed by the ACS Student Code of Conduct and the Schoolwide Positive Behavior Intervention Support Plan at the student’s home school. PARENT OR GUARDIAN (If the student is under the age of 18, a parent or guardian must also read and sign this agreement.) As the parent or guardian of this student, I have read this document and Alleghany County Public Schools Technology Policies (10000) posted on Alleghany County Website. I understand that the use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that Internet and technology resources is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members a standard part of the school community Connecting instructional process and is considered the same as using a textbook or any device other resource to the school’s ICT network without approval from authorised personnel Setting up any softwareenhance or deliver instruction. Furthermore, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gainI understand that my child may be issued an email account, access to restricted areas of learning networks, and/or given access to other specific online content in order to support the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised instructional process as is age and/or grade level appropriate. I further understand that access to the schoolInternet and the use of school owned technology resources are intended for educational purposes only. I also recognize that even though Alleghany County Public Schools uses appropriate Internet filtering software, it is impossible to restrict access to all inappropriate materials, and I will not hold the school system responsible if my child accesses or acquires such materials on the network. I accept responsibility for my child’s ICT facilities Causing intentional damage to compliance with the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised Acceptable Use Policy. I give my consent for school district personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to monitor my child’s school issued email account as well as my child’s internet activity on school owned computers and the school Using websites network. I have read to my child (or mechanisms to bypass they have read), and understand, and will abide by the school’s filtering or monitoring mechanisms Engaging Alleghany County Public Schools Student Internet Safety and Acceptable Use of Technology Resources Policy (10100/10200/10226). Students understand that should they commit any violation of this policy, their access privileges may be revoked, and school disciplinary action and/or legal action may be taken. Students further understand that they will be issued an email account and/or other online tools, that they should use them appropriately and in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots accordance with Policy (such as ChatGPT and Google Bard) to generate text or imagery presented as original work10100/10226). This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.Parent Signature: Date: / /

Appears in 1 contract

Samples: Handbook and Agreement

Unacceptable Use. Unacceptable The following is considered unacceptable use of the school’s ICT facilities. Any breach of this policy may result in disciplinary or behaviour proceedings. Unacceptable use of the School’s ICT facilities includes: Using the schoolSchool’s ICT facilities to breach intellectual property rights or copyright Using the schoolSchool’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the schoolSchool’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate Exceptions Where the use of school ICT facilities (on the school premises and/or remotely) is required for a purpose that would otherwise be considered an unacceptable use, exemptions to the policy may be granted at the Headmaster’s discretion. For example through the use of AI technology: • Pupils may use AI tools and generative chatbots (such as ChatGPT chatbots: • As a research tool to help them find out about new topics and Google Bard) to generate text ideas • When specifically studying and discussing AI in schoolwork, for example in IT lessons or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilitiesart homework about AI-generated images.

Appears in 1 contract

Samples: Acceptable Use Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT Head teacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.plympton-st-maurice-primary.org.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: static1.squarespace.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member Head of the SLT School will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: eslingtonfurrowfield.org

Unacceptable Use. Unacceptable use The following conduct is not permitted under any circumstances whether using the School network or IT Services or not (for example personal devices), and whether on school premises or at school activities (for example on excursions):  Cyber Bullying  Posting personal information (including photographs) about another person without that person’s consent  Engaging in abusive behavior, discrimination or harassment of the school’s ICT facilities includes: any kind  Using the school’s ICT facilities email or Social Media to breach intellectual property rights embarrass or copyright Using the school’s ICT facilities to bully or harass someone elsedefame any person, or to promote unlawful discrimination Breaching the school’s policies spread rumours, including by posting comments or procedures Any illegal conductphotographs  Allowing someone else to use your account, or statements which are deemed sharing your login information  Using an account owned by another user  Gaining unauthorised access to be advocating illegal activity Online resources or secure files  Accessing, downloading, sending or storing lewd or distasteful material, including (without limitation) material of a violent, racist, sexist or pornographic nature, or material containing sex or nudity, offensive language or demonstrations of drug use  Attempting to access content that is not appropriate, including (without limitation) gambling, inappropriate advertisingextremism, phishing and/or financial scams Accessing, creating, storing, linking to weapons  Engaging in activities which disrupt or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages damage the schoolcomputer system, or risks bringing the school into disrepute Sharing confidential information about the schoolmay be likely to do so. This includes gaining access to "hacking" sites, its students, possessing "hacking" software or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, downloading (or attempting to gaindownload) any program, access to restricted areas of the network, software or to any password-protected information, file from an unsecure or unknown source without prior approval from authorised personnel Allowingthe school  Posting viral email, encouraging sending insulting or enabling threatening messages, promoting money-making schemes, including indicating that negative things will happen to a recipient if they do not forward an email or photo.  Recording audio or video of a teacher or fellow student without prior consent. Academic dishonesty Plagiarism is using the ideas or words of others to gain (and claiming them as your own. In Judaism, this is called Genivat Deat - stealing someone else's ideas. Deliberate plagiarism, including copying another student’s work or attempt to gain) unauthorised access to copying and pasting from the school’s ICT facilities Causing intentional damage to Internet, is an offence and is against the school’s ICT facilities Removinglaw. All statements, deleting or disposing of opinions, conclusions etc. taken from another writer's work should be cited, whether the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business work is directly related to quoted, paraphrased or summarised. Whenever the school Using websites words or mechanisms to bypass ideas of another person are used, the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalisedsource must be acknowledged. Information from the Internet must be referenced, extremist, racist, antisemitic or discriminatory in like any other way Inappropriate use of AI tools source. As plagiarism contravenes basic Jewish and generative chatbots (such as ChatGPT School ethical standards, significant consequences will be forthcoming for any student who does plagiarise. Privacy and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. Surveillance The school School reserves the right to amend this list at access and monitor email, websites, server logs and electronic files and any time. The headteacher computer or other relevant member of electronic device connected to the SLT will use their professional judgement KDS network should it determine that there is reason to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilitiesdo so.

Appears in 1 contract

Samples: media.edufolios.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of designated Data Protection Officer and the SLT DSL will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: lancastersteinerschool.org

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Senior Leadership Team (SLT) or any other relevant member of the SLT staff will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: theblueschool.com

AutoNDA by SimpleDocs

Unacceptable Use. Unacceptable use Any attempt to circumvent or bypass the web filter is a major offense. Internet usage on the iPad is not monitored while students are away from the school network, and Xxxxx takes no responsibility for content accessed by the students. Parents should monitor student activities as they feel necessary while at home. Student Activities Strictly Prohibited includes but is not limited to:  Illegal installation, appropriation, or transmission of copyrighted materials  Any action that violates existing Seton policies, Seton student handbook, or public law  Sending, accessing, uploading, downloading, or distributing offensive or embarrassing, profane, threatening, pornographic, obscene, or sexually explicit materials or those that can be interpreted as harassing or demeaning  Using the iPad camera, video, FaceTime or other apps in any way that is offensive, profane, threatening, pornographic, obscene, sexually explicit or damaging to another person  Use of chat rooms, sites selling term papers, book reports and other forms of student work  Taking pictures of other student’s work unless working on a group project  Use of bit torrents or illegal file sharing sites  Any form of jail breaking, rooting or in any other way tampering with the iPad’s iOS operating system  Changing iPad settings (exceptions include personal settings such as font size, brightness, etc.)  Spamming, sending mass or inappropriate emails  Gaining access to other student’s accounts, files, and/or data  Use of the school’s ICT facilities includes: Using Internet, network or email accounts for financial or commercial gain or for any illegal activity  Use of any form of anonymous and/or false communications  Participation in credit card fraud, electronic forgery or other forms of illegal behavior  Vandalism (any malicious attempt to harm or destroy hardware, software, or data, including but not limited to the uploading or creation of computer viruses or computer programs that can infiltrate computer systems and/or damage software components) of school equipment  Bypassing the school’s ICT facilities web filter through a proxy server  Using another student’s iPad  The iPad may not be used to breach intellectual property rights take pictures, videos or record sounds of other students, guests or school personnel without their express consent. Legal Propriety/Copyright All students must comply with trademark and copyright Using laws and all license agreements. Ignorance of the school’s ICT facilities law is not immunity. If you are unsure, ask a teacher or parent. Plagiarism is a violation of Seton's handbook. Give credit to bully all sources used, whether quoted or harass someone elsesummarized. This includes all forms of media on the Internet, such as graphics, movies, music, and text. Use or possession of hacking software is strictly prohibited. Violation of applicable state or federal law will result in criminal prosecution and/or disciplinary action. Policy Violations and Disciplinary Consequences Misuse of school iPads will result in confiscation and search of the iPad. If violations of the technology agreement are found on the iPad, it will be restored to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about default settings resulting in the school, its students, loss of all installed media and any school assignments/class work that was not backed up. Students will be held accountable by their teachers for assignments that are not complete because their iPad was restored due to misuse. Additional disciplinary action and or other members loss of privileges/features may be taken by the school depending on the severity of the infraction including: detention, daily check-in/checkout of iPads from the technology teacher, iPad privilege suspension and termination of privileges. Violations may result in disciplinary action up to and including expulsion for students. When applicable, law enforcement agencies may be involved. The school community Connecting any principal/pastor will be the sole arbiters of interpretation, violation and penalization of every aspect of the Technology Policy. Loss of School Property Students are responsible for the loss of computer devices, including iPads that are assigned to them. The student will be responsible for the replacement cost of the device if it is not found within 2 weeks. Any missing or stolen equipment must immediately be reported to the principal and if appropriate, the nearest law enforcement agency. Every effort will be made to locate and recover the missing device.  Procedures for Reporting Theft Outside the School  Report immediately to the law enforcement jurisdiction where the loss/theft occurred and file a report.  Request a copy of the report to give to the school’s ICT network without approval from authorised personnel Setting up any software.  Procedures for Reporting Theft Inside the School  Report immediately to the office.  Retrace all steps taken since the loss of the equipment. Check with teachers friends, applications or web services on etc.  Follow the above procedures for reporting outside the school’s network without approval by authorised personnel. Malfunctioning iPads must be reported immediately to the technology teacher so that the device can be repaired or replaced. Unattended iPads – iPads are not to be left unattended and should be secured in a locker when not in use. iPad Check out Procedure Criteria for checking out an iPad:  A completed, or creating or using any programmesigned copy of this agreement. (Only the last page is needed)  A completed, tool or item of software designed to interfere with the functioning signed copy of the school’s ICT facilitiesACCEPTABLE USE and INTERNET SAFETY POLICY. (Only the last 2 pages are needed)  Insurance for the iPad must be purchased through Seton School. It is encouraged that you create an iTunes account prior to picking up the iPad. Instructions for creating an iTunes account are listed under the “User Accounts” portion of this policy. Once the equipment has been checked out, accounts or data Gaining, or attempting to gain, access to restricted areas it is in the full possession and responsibility of the networkstudent. The assigned iPad will include:  iPad  Charger  Protective Case  Apps iPad Return/Buy Out Procedure All items that were checked out to the student when the iPad was assigned must be returned when the student graduates, transfers out or when the school upgrades students to any passworda newer iPad. Alternatively the student and parent will be given the option to purchase the iPad for personal non-protected informationschool use. The price for the purchase of the iPad will be the market value of the iPad, without approval from authorised personnel Allowingapps and protective case at the time the iPad is to be returned. If you decide that you do not want to purchase the iPad, encouraging the student and or enabling others to gain (or attempt to gain) unauthorised access parent can return the iPad to the school’s ICT facilities Causing intentional damage . When the iPad and accessories are returned, they will be inspected for damages. Damages outside of normal wear and tear must be paid for by the student or parent at the time of return. If you do not return the iPad or make arrangements for return it is assumed you want to purchase the school’s ICT facilities Removing, deleting or disposing iPad and you will be billed the market value of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilitiesiPad.

Appears in 1 contract

Samples: www.seton-school.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT Head Master will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: mougins-school.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or any other relevant member of the SLT staff will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: s3-eu-west-1.amazonaws.com

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Usage

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT Headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: greatstoneschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT Headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: ashleyjuniorschool.co.uk

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its studentspupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programmeprogram, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel Allowing, encouraging encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes programs or information without permission from by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher Headteacher or other relevant member of the SLT Deputy Head will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.

Appears in 1 contract

Samples: www.aaps.uk.com

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!