Common use of Unacceptable Use Clause in Contracts

Unacceptable Use. The following is considered unacceptable use of the ICT facilities by any member of the MITRE community. Unacceptable use of the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights or copyright; • Using MITRE’s IT facilities to bully or harass someone else, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conduct, or statements which are deemed to be advocating illegal activity; • Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • Activity which defames or disparages the school, or risks bringing the Trust into disrepute; • Inappropriate sharing of confidential information or data about the Trust, its pupils, or other members of the MITRE community; • Connecting any device to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up any software, applications or web services on MITRE’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment and facilities; • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 2 contracts

Samples: It Acceptable Use Policy, It Acceptable Use Policy

AutoNDA by SimpleDocs

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO headteacher or Head other delegated member of IT SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 2 contracts

Samples: Acceptable Use Policy, Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the ICT facilities by any member of the MITRE community. Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupilsstudents, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any programprogramme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to the school’s ICT equipment and facilities; • facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programs programmes or information without permission by from authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed permitted by authorised personnel to have access, or without authorisation; • authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using way Inappropriate use of AI tools and generative large language models chatbots (such as GPT-3): o During assessments, including internal ChatGPT and external assessments, and coursework; o To write the homework or assignments, where AI-generated Google Bard) to generate text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information original work. This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO headteacher or Head other relevant member of IT the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 2 contracts

Samples: Ict and Internet Acceptable Use Policy, Ict and Internet Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 2 contracts

Samples: Ict and Internet Acceptable Use Policy, Ict Acceptable Usage Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member facilities. Any breach of the MITRE communitythis policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any programprogramme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to the school’s ICT equipment and facilities; • facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programs programmes or information without permission by from authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed permitted by authorised personnel to have access, or without authorisation; • authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information way This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT headteacher and computing subject leader will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. The following Any attempt to circumvent or bypass the web filter is considered unacceptable use a significant offense. Internet usage on the device is not monitored while students are away from the school network, and VRCS takes no responsibility for students' content. Parents should monitor student activities as they feel necessary while at home. There should be no expectation of privacy; devices are subject to inspection at the ICT facilities by any member request of the MITRE communityadministration and without prior notice. Unacceptable use of the ICT facilities includesStudent Activities Strictly Prohibited includes but is not limited to: • Using MITRE’s IT facilities to breach intellectual property rights or copyright; • Using MITRE’s IT facilities to bully or harass someone else Illegal installation, appropriation, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • transmission of copyrighted materials  Any illegal conductaction that violates existing VRCS policies, VRCS student handbooks, or statements which are deemed to be advocating illegal activity; • Accessingpublic law  Sending, creatingaccessing, storinguploading, linking to downloading, or sending material that is distributing offensive or embarrassing, profane, threatening, pornographic, offensive, obscene or otherwise inappropriate; • Activity which defames or disparages the schoolobscene, or risks bringing sexually explicit materials or those that can be interpreted as harassing or demeaning  Using the Trust into disrepute; • Inappropriate sharing of confidential information or data about the Trustdevice camera, its pupilsvideo, video/audio conferencing apps/software, or other members of the MITRE community; • Connecting apps/software in any device to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up any softwareway that is offensive, applications or web services on MITRE’s network without approval by authorised personnelprofane, threatening, pornographic, obscene, sexually explicit, or creating damaging to another person  Use of chat rooms sites selling term papers, book reports, and other forms of student work  Taking pictures of other student’s work unless working on a group project  Use of peer-to-peer file-sharing or using any programillegal file-sharing sites  Any form of jailbreaking, tool or item of software designed to interfere with the functioning of the ICT facilitiesrooting, accounts or data; • Gainingunlocking, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment and facilities; • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to way tampering with the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models device’s operating system  Changing device settings (exceptions include personal settings such as GPT-3): o During assessmentsfont size, including internal and external assessmentsbrightness, etc.)  Spamming, sending mass, or inappropriate emails  Gaining access to other students’ accounts, files, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use  Use of the school’s Internet, network, or Trustemail accounts for financial or commercial gain or any illegal or inappropriate activity  Use of any form of anonymous and false communications  Participation in credit card fraud, electronic forgery, or other forms of illegal behavior  Vandalism (any malicious attempt to harm or destroy hardware, software, or data, including but not limited to the uploading or creation of computer viruses or computer programs that can infiltrate computer systems and/or damage software components) of school equipment  Bypassing the school’s ICT facilitiesweb filter through a proxy server or VPN  Using another student’s device  The device may not be used to take pictures, videos, or record sounds of other students, guests, or school personnel without their consent. All students must comply with trademark and copyright laws and all license agreements. Ignorance of the law is not immunity. If you are unsure, ask a teacher or parent. Plagiarism is a violation of VRCS handbooks. Give credit to all sources used, whether quoted or summarized. This includes all media forms on the Internet, such as graphics, movies, music, and text. Use or possession of hacking software is strictly prohibited. Violation of applicable state or federal law will result in criminal prosecution and disciplinary action.

Appears in 1 contract

Samples: Technology Lease Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: • Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; copyright • Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; discrimination • Breaching the School/Trust school’s policies or procedures; procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity; activity • Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; inappropriate • Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; disrepute Inappropriate sharing of Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; school community • Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; authorised personnel • Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel; personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; facilities • Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; authorisation • Using inappropriate or offensive language; language • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. school • Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT Headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO Headteacher or Deputy Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright ● Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination ● Breaching the School/Trust school’s policies or procedures; • procedures ● Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity ● Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate ● Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute ● Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community ● Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel ● Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data ● Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel ● Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities ● Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities ● Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel ● Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation ● Using inappropriate or offensive language; • language ● Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school ● Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT Master will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Use Policy

Unacceptable Use. 2.1 The following is considered school reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of the ICT facilities by any member of the MITRE communityits IT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 All actions or activities that are illegal or in conflict with the School’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 Using the IT Facilities for access, creation, modification, storage, download, hosting or transmission of the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights or copyright; • Using MITRE’s IT facilities to bully or harass someone elsematerial that could be considered pornographic, offensive, obscene, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conductotherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 Publishing materials or making statements which are deemed the school may deem to be advocating illegal activity; • Accessing, creatingor threatening, storingor harassing, linking to or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 Authoring or sending material any form of electronic communications or messages, including, but not limited to, messages and emails that is pornographicwere unsolicited and may be considered junk mail, offensive"chain letters", obscene hoax warnings or otherwise inappropriate; • Activity which defames or disparages advertising, and that do not correctly identify you as the schoolsender, or risks bringing messages which appear to originate from another person. 2.1.6 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the Trust into disrepute; • Inappropriate sharing School or through the use of confidential information IT Facilities. 2.1.7 Connecting any non-approved IT device, system or data about service (including wireless access points) to school networks or setting up any network services, without the Trustexplicit or delegated permission from Authorised Personnel. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, its pupilsinciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 Causing any damage to IT Facilities, including through the consumption of food or drink, or other members of moving or removing such facilities without authorisation. The School reserves the MITRE community; • Connecting right to charge for any device damage caused. 2.1.11 Attempting to the MITRE’s modify, alter or in any way interfere with IT network without approval from MITRE’s IT team; • Setting up any facility security controls, hardware or software, applications configurations, settings, equipment, data files or web services on MITRE’s network websites without approval the written authorisation or delegated permission from Authorised Personnel. 2.1.12 Introduction of unauthorised and/or malicious software or programs into the IT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by authorised personneldownloading, or creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of the ICT facilitiesIT Facilities, user accounts or data; • Gaining. 2.1.13 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT system or service, or attempting account, that the user is not expressly authorised to gainaccess. Disruption includes, access to restricted areas but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the networkschool or any similar name, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access abbreviation that may mislead the public into believing that the domain name refers to the school’s . 2.1.16 Acting in any way that directly or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment and facilities; • Removing, deleting or disposing indirectly causes disruption to others’ use of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifyingSchool IT Facilities, or sharing data (including personal data) using IT Facilities to which a user is not supposed to have access, disrupt or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to deny the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list use of IT Facilities of third parties at any time. The CEOI understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, COO to ensure that there is no risk to my safety or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use safety and security of the school’s or Trust’s ICT facilitiessystems and other users.

Appears in 1 contract

Samples: It Acceptable Use Policy and Agreement

Unacceptable Use. ‌ 3.1 The following is considered unacceptable use of the trust’s ICT facilities by any member of the MITRE trust community. Any breach of this policy may result in disciplinary or behaviour proceedings 3.2 Unacceptable use of the trust’s ICT facilities includes: includes the below list. This is not an exhaustive list. The trust reserves the right to amend this list at any time. The trust will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the trust’s ICT facilities • Using MITREthe trust’s IT ICT facilities to breach intellectual property rights or copyright; copyright • Using MITREthe trust’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; discrimination • Breaching the School/Trust trust’s policies or procedures; procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity; activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to to, or sending material that is pornographic, offensive, obscene or otherwise inappropriate; inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) • Activity which defames or disparages the schooltrust, or risks bringing the Trust trust into disrepute; disrepute Inappropriate sharing of Sharing confidential information or data about the Trusttrust, its pupils, or other members of the MITRE community; trust community • Connecting any device to the MITREtrust’s IT ICT network without approval from MITRE’s IT team; authorised personnel • Setting up any software, applications applications, or web services on MITREthe trust’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; personnel • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trusttrust’s ICT facilities; facilities • Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; facilities • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the trust • Using websites or mechanisms to bypass the trust’s filtering mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic anti-Semitic, or discriminatory in any other way; way • Leaving ICT equipment anywhere other than on your person, at work or at home e.g., in the car • Using inappropriate or offensive language; • Promoting a private business(generic portable solid-state data storage device): data stick, unless that business is directly related to the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessmentspen drive, including internal and external assessmentsthumb drive, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.USB drive

Appears in 1 contract

Samples: Ict Acceptable Use Policy

Unacceptable Use. The following conduct is considered unacceptable use not permitted under any circumstances whether using the School network or IT Services or not (for example personal devices), and whether on school premises or at school activities (for example on excursions):  Cyber Bullying  Posting personal information (including photographs) about another person without that person’s consent  Engaging in abusive behavior, discrimination or harassment of the ICT facilities by any member of the MITRE community. Unacceptable use of the ICT facilities includes: • kind  Using MITRE’s IT facilities email or Social Media to breach intellectual property rights embarrass or copyright; • Using MITRE’s IT facilities to bully or harass someone elsedefame any person, or to promote unlawful discrimination; • Breaching the School/Trust policies spread rumours, including by posting comments or procedures; • Any illegal conductphotographs  Allowing someone else to use your account, or statements which are deemed to be advocating illegal activity; • Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • Activity which defames or disparages the school, or risks bringing the Trust into disrepute; • Inappropriate sharing of confidential your login information or data about the Trust, its pupils, or other members of the MITRE community; • Connecting any device to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up any software, applications or web services on MITRE’s network without approval  Using an account owned by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) another user  Gaining unauthorised access to the school’s resources or Trust’s ICT facilities; • Causing intentional damage secure files  Accessing, downloading, sending or defacing storing lewd or distasteful material, including (including stickerswithout limitation) ICT equipment and facilities; • Removing, deleting or disposing material of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremistviolent, racist, antisemitic sexist or discriminatory pornographic nature, or material containing sex or nudity, offensive language or demonstrations of drug use  Attempting to access content that is not appropriate, including (without limitation) gambling, extremism, weapons  Engaging in any other way; • Using inappropriate activities which disrupt or offensive language; • Promoting a private businessdamage the computer system, unless that business is directly related to the Trust operations; and you have express permission or may be likely to do so. • Using websites This includes gaining access to "hacking" sites, possessing "hacking" software or mechanisms downloading (or attempting to bypass filtering download) any program, software or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessmentsfile from an unsecure or unknown source without prior approval from the school  Posting viral email, sending insulting or threatening messages, promoting money-making schemes, including internal indicating that negative things will happen to a recipient if they do not forward an email or photo.  Recording audio or video of a teacher or fellow student without prior consent. Plagiarism is using the ideas or words of others and external assessmentsclaiming them as your own. In Judaism, this is called Genivat Deat - stealing someone else's ideas. Deliberate plagiarism, including copying another student’s work or copying and coursework; o To write pasting from the homework Internet, is an offence and is against the law. All statements, opinions, conclusions etc. taken from another writer's work should be cited, whether the work is directly quoted, paraphrased or assignmentssummarised. Whenever the words or ideas of another person are used, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personalthe source must be acknowledged. Information from the Internet must be referenced, sensitive or intellectual property data or information This is not an exhaustive listlike any other source. MITRE The School reserves the right to amend this list at access and monitor email, websites, server logs and electronic files and any time. The CEO, COO computer or Head of IT will use their professional judgement electronic device connected to the KDS network should it determine whether any act or behaviour not on the list above that there is considered unacceptable use of the school’s or Trust’s ICT facilitiesreason to do so.

Appears in 1 contract

Samples: Ict Student Acceptable Use Policy & Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright ● Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination ● Breaching the School/Trust school’s policies or procedures; • procedures ● Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity ● Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate ● Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute ● Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community ● Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel ● Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data ● Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel ● Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities ● Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities ● Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel ● Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation ● Using inappropriate or offensive language; • language ● Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school ● Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO Senior Leadership Team (SLT) or Head any other relevant member of IT staff will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member facilities. Any breach of the MITRE communitythis policy may result in disciplinary or behaviour proceedings. Unacceptable use of the School’s ICT facilities includes: • Using MITREthe School’s IT ICT facilities to breach intellectual property rights or copyright; copyright • Using MITREthe School’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; discrimination • Breaching the School/Trust school’s policies or procedures; procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity; activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams • Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; disrepute Inappropriate sharing of Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; school community • Connecting any device to the MITRESchool’s IT ICT network without approval from MITRE’s IT team; authorised personnel • Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any programprogramme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data; data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-password- protected information, without approval from authorised personnel; personnel • Allowing, encouraging, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; facilities • Causing intentional damage or defacing (including stickers) to the school’s ICT equipment and facilities; facilities • Removing, deleting or disposing of the school’s ICT equipment, systems, programs programmes or information without permission by from authorised personnel; personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed permitted by authorised personnel to have access, or without authorisation; authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the school • Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting way Where the use of school ICT facilities (on the school premises and/or remotely) is required for a private businesspurpose that would otherwise be considered an unacceptable use, unless that business is directly related exemptions to the Trust operations; and you have express permission to do sopolicy may be granted at the Headmaster’s discretion. For example through the use of AI technology: Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using Pupils may use AI tools and generative large language models (such as GPT-3): o During assessmentschatbots: • As a research tool to help them find out about new topics and ideas • When specifically studying and discussing AI in schoolwork, including internal and external assessments, and coursework; o To write the for example in IT lessons or art homework or assignments, where about AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilitiesimages.

Appears in 1 contract

Samples: Acceptable Use Policy

Unacceptable Use. 4.1 The following is considered Trust reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of its ICT facilities. Unacceptable use includes, but is not limited to: - All actions or activities that are illegal or in conflict with the Trust’s policies, procedures and processes; - Using the ICT facilities by any member for access, creation, modification, storage, download, hosting or transmission of the MITRE community. Unacceptable use of the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights or copyright; • Using MITRE’s IT facilities to bully or harass someone elsematerial that could be considered pornographic, offensive, obscene, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conductotherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material; - Publishing materials or making statements which are deemed the Trust may deem to be advocating illegal activity, or threatening, or harassing, or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience; • Accessing- Unauthorised production, creatingdistribution, storingcopying, linking to selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the Trust does not have an active licence or explicit permission of the copyright owner, is strictly prohibited; - Authoring or sending material any form of electronic communications or messages, including, but not limited to, messages and emails that is pornographicwere unsolicited and may be considered junk mail, offensive"chain letters", obscene "Ponzi", hoax warnings or otherwise inappropriate; • Activity which defames or disparages advertising, and that do not correctly identify you as the schoolsender, or risks bringing messages which appear to originate from another person; - Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the Trust into disreputeor through the use of ICT facilities; • Inappropriate sharing of confidential information - Connecting any non-approved ICT device, system or data about service (including wireless access points) to Trust networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel; - Unauthorised access (or attempted unauthorised access) to any ICT facilities provided by the Trust; - Allowing, its pupilsinciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the ICT facilities; - Causing any damage to ICT facilities, including through the consumption of food or drink, or other members of moving or removing such facilities without authorisation. The Trust reserves the MITRE communityright to charge for any damage caused; • Connecting - Attempting to modify, alter or in any device to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up any way interfere with ICT facility security controls, hardware or software, applications configurations, settings, equipment, data files or web services on MITRE’s network websites without approval the written authorisation or delegated permission from Authorised Personnel; - Introduction of unauthorised and/or malicious software or programs into the ICT facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by authorised personneldownloading, or creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of the ICT facilities, user accounts or data; • Gaining- Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain modifying data (or attempt to gaindata headers) unauthorised access to of which the school’s or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment and facilities; • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have accessan intended recipient or logging into an ICT system or service, or account, that the user is not expressly authorised to access. Disruption includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information; - Executing any form of network monitoring including any data capture, port scanning or security scanning without authorisationwritten authorisation or delegated permission from Authorised Personnel; • Engaging in content - Registering for any system or conduct service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the Trust or any similar name, or abbreviation that is radicalised, extremist, racist, antisemitic or discriminatory may mislead the public into believing that the domain name refers to the Trust; and - Acting in any other way; • Using inappropriate way that directly or offensive language; • Promoting a private businessindirectly causes disruption to others’ use of Trust facilities, unless that business is directly related or using ICT facilities to disrupt or deny the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list use of ICT facilities of third parties at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: User Agreement

AutoNDA by SimpleDocs

Unacceptable Use. 3.1. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings. 3.2. Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright ● Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination ● Breaching the School/Trust school’s policies or procedures; • procedures ● Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity ● Online gambling, inappropriate advertising, phishing and/or financial scams ● Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate or harmful ● Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams (also known as sexting or youth-produced sexual imagery) ● Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute ● Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community ● Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel ● Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data ● Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel ● Allowing, encouraging, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities ● Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities ● Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel ● Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • authorisation ● Using inappropriate or offensive language ● Promoting a private business, unless that business is directly related to the school ● Using websites or mechanisms to bypass the school’s filtering mechanisms ● Engaging in content or conduct that is radicalised, extremist, racist, antisemitic anti-Semitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so 3.3. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO headteacher or Head any other relevant member of IT staff will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict Acceptable Use Policy and Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT Headteacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. 4.1 The following is considered Learning Community Trust reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of the its ICT facilities by any member of the MITRE communityFacilities. Unacceptable use of includes, but is not limited to: 4.1.1 All actions or activities that are illegal or in conflict with the Trust’s policies, procedures, processes and regulations or which breach contracts or policies applied to the Academy by third party through a valid service contract or agreement. 4.1.2 Using the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights Facilities for access, creation, modification, storage, download, hosting or copyright; • Using MITRE’s IT facilities to bully or harass someone elsetransmission of material that could be considered pornographic, offensive, obscene, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conductotherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 4.1.3 Publishing materials or making statements which are deemed the Trust may deem to be advocating illegal activity; • Accessing, creatingor threatening, storingor harassing, linking to or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 4.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the Trust does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 4.1.5 Authoring or sending material any form of electronic communications or messages, including, but not limited to, videos, chats, messages and/or emails that is pornographicwere unsolicited and may be considered inappropriate, offensivejunk, obscene "chain letters", "Ponzi", hoax warnings or otherwise inappropriate; • Activity which defames or disparages advertising, and that do not correctly identify you as the schoolsender, or risks bringing messages which appear to originate from another person. 4.1.6 Unauthorised recording, “screenshotting”, capturing, photographing or any other means of observing and/or documenting the Materials of an ICT device, without prior notification and agreement. 4.1.7 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the Trust into disrepute; • Inappropriate sharing or through the use of confidential information ICT Facilities. 4.1.8 Connecting any non-approved ICT device, system or data about service (including wireless access points) to Trust networks or setting up any network services, without the explicit or delegated permission from Authorised Personnel. 4.1.9 Unauthorised access (or attempted unauthorised access) to any ICT Facilities provided by the Learning Community Trust. 4.1.10 Allowing, its pupilsinciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the ICT Facilities. 4.1.11 Causing any damage to ICT Facilities, including through the consumption of food or drink, or other members of moving or removing such facilities without authorisation. The Learning Community Trust reserves the MITRE community; • Connecting right to charge for any device damage caused. 4.1.12 Attempting to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up modify, alter or in any way interfere with ICT facility security controls, hardware or software, applications configurations, settings, equipment, data files or web services on MITRE’s network websites without approval the written authorisation or delegated permission from Authorised Personnel. 4.1.13 Introduction of unauthorised and/or malicious software or programs into the ICT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by authorised personneldownloading, or creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of the ICT facilitiesFacilities, user accounts or data; • Gaining. 4.1.14 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an ICT system or service, or attempting account, that the user is not expressly authorised to gainaccess. Disruption includes, access to restricted areas but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 4.1.15 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 4.1.16 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the networkTrust or its Academies or any similar name, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access abbreviation that may mislead the public into believing that the domain name refers to the school’s Trust. 4.1.17 Acting in any way that directly or indirectly causes disruption to others’ use of Trust’s ICT facilities; • Causing intentional damage Facilities or defacing (including stickers) using ICT equipment and facilities; • Removing, deleting Facilities to disrupt or disposing deny the use of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in Facilities of third parties at any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do sotime. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use but merely an indication of the school’s types of conduct that could come under the heading of inappropriate. Failure to follow this policy may result in disciplinary action up to and including dismissal. It may also lead to criminal or Trust’s ICT facilitiescivil action.

Appears in 1 contract

Samples: Acceptable Use Policy Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT designated Data Protection Officer and the DSL will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO Headteacher or Head any other relevant member of IT staff will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member facilities. Any breach of the MITRE communitythis policy may result in disciplinary or behaviour proceedings. Unacceptable use of the School’s ICT facilities includes: • Using MITREthe School’s IT ICT facilities to breach intellectual property rights or copyright; copyright • Using MITREthe School’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; discrimination • Breaching the School/Trust school’s policies or procedures; procedures • Any illegal conduct, or statements which are deemed to be advocating illegal activity; activity • Online gambling, inappropriate advertising, phishing and/or financial scams • Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; inappropriate or harmful • Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams • Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; disrepute Inappropriate sharing of Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; school community • Connecting any device to the MITRESchool’s IT ICT network without approval from MITRE’s IT team; authorised personnel • Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any programprogramme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data; data • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; personnel • Allowing, encouraging, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; facilities • Causing intentional damage or defacing (including stickers) to the school’s ICT equipment and facilities; facilities • Removing, deleting or disposing of the school’s ICT equipment, systems, programs programmes or information without permission by from authorised personnel; personnel • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed permitted by authorised personnel to have access, or without authorisation; authorisation • Using inappropriate or offensive language • Promoting a private business, unless that business is directly related to the school • Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting way Where the use of school ICT facilities (on the school premises and/or remotely) is required for a private businesspurpose that would otherwise be considered an unacceptable use, unless that business is directly related exemptions to the Trust operations; and you have express permission to do sopolicy may be granted at the Headmaster’s discretion. For example through the use of AI technology: Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using Pupils may use AI tools and generative large language models (such as GPT-3): o During assessmentschatbots: • As a research tool to help them find out about new topics and ideas • When specifically studying and discussing AI in schoolwork, including internal and external assessments, and coursework; o To write the for example in IT lessons or art homework or assignments, where about AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilitiesimages.

Appears in 1 contract

Samples: Acceptable Use Agreement

Unacceptable Use. 4.1 The following is considered Academy reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of the its ICT facilities by any member of the MITRE communityFacilities. Unacceptable use of includes, but is not limited to: 4.1.1 All actions or activities that are illegal or in conflict with the Academy’s policies, procedures, processes and regulations or which breach contracts or policies applied to the Academy by third party through a valid service contract or agreement. 4.1.2 Using the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights Facilities for access, creation, modification, storage, download, hosting or copyright; • Using MITRE’s IT facilities to bully or harass someone elsetransmission of material that could be considered pornographic, offensive, obscene, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conductotherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 4.1.3 Publishing materials or making statements which are deemed the Academy may deem to be advocating illegal activity; • Accessing, creatingor threatening, storingor harassing, linking to or defamatory, or bullying or disparaging of others, or abusive, or libellous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 4.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the Academy does not have an active licence or explicit permission of the copyright owner, is strictly prohibited. 4.1.5 Authoring or sending material any form of electronic communications or messages, including, but not limited to, videos, chats, messages and/or emails that is pornographicwere unsolicited and may be considered inappropriate, offensivejunk, obscene "chain letters", "Ponzi", hoax warnings or otherwise inappropriate; • Activity which defames or disparages advertising, and that do not correctly identify you as the schoolsender, or risks bringing messages which appear to originate from another person. 4.1.6 Unauthorised recording, “screenshotting”, capturing, photographing or any other means of observing and/or documenting the Trust into disrepute; • Inappropriate sharing Materials of confidential information or data about the Trust, its pupils, or other members of the MITRE community; • Connecting any device to the MITRE’s IT network without approval from MITRE’s IT team; • Setting up any software, applications or web services on MITRE’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the an ICT facilities, accounts or data; • Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected informationdevice, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment prior notification and facilities; • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • Using inappropriate or offensive language; • Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list at any time. The CEO, COO or Head of IT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilitiesagreement.

Appears in 1 contract

Samples: Acceptable Use Agreement

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT School will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. The following is considered unacceptable use of the school’s ICT facilities by any member of the MITRE school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using MITREthe school’s IT ICT facilities to breach intellectual property rights or copyright; • copyright Using MITREthe school’s IT ICT facilities to bully or harass someone else, or to promote unlawful discrimination; • discrimination Breaching the School/Trust school’s policies or procedures; • procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity; • activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate; • inappropriate Activity which defames or disparages the school, or risks bringing the Trust school into disrepute; • Inappropriate sharing of disrepute Sharing confidential information or data about the Trustschool, its pupils, or other members of the MITRE community; • school community Connecting any device to the MITREschool’s IT ICT network without approval from MITRE’s IT team; • authorised personnel Setting up any software, applications or web services on MITREthe school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data; • data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel; • personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s or Trust’s ICT facilities; • facilities Causing intentional damage or defacing (including stickers) to ICT equipment and facilities; • facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way; • authorisation Using inappropriate or offensive language; • language Promoting a private business, unless that business is directly related to the Trust operations; and you have express permission to do so. • school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information mechanisms This is not an exhaustive list. MITRE The school reserves the right to amend this list at any time. The CEO, COO or Head of IT teacher will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s or Trust’s ICT facilities.

Appears in 1 contract

Samples: Ict and Internet Acceptable Use Policy

Unacceptable Use. 2.1 The following is considered school reserves the right to block, disconnect or otherwise prevent what it considers to be unacceptable use of the ICT facilities by any member of the MITRE communityits IT Facilities. Unacceptable use includes, but is not limited to: 2.1.1 All actions or activities that are illegal or in conflict with the School’s policies, procedures, processes and regulations or which breach contracts or policies applied to the School by third party through a valid service contract or agreement. 2.1.2 Using the IT Facilities for access, creation, modification, storage, download, hosting or transmission of the ICT facilities includes: • Using MITRE’s IT facilities to breach intellectual property rights or copyright; • Using MITRE’s IT facilities to bully or harass someone elsematerial that could be considered pornographic, offensive, obscene, or to promote unlawful discrimination; • Breaching the School/Trust policies or procedures; • Any illegal conductotherwise inappropriate, or for placing direct or indirect links to websites which publish or host pornographic, offensive or inappropriate material. 2.1.3 Publishing materials or making statements which are deemed the school may deem to be advocating illegal activity; • Accessing, creatingor threatening, storingor harassing, linking to or defamatory, or bullying or disparaging of others, or abusive, or libelous, or slanderous, or indecent, or obscene, or offensive or promotes unlawful discrimination, breaches copyright or otherwise causing annoyance, or inconvenience. 2.1.4 Unauthorised production, distribution, copying, selling, hiring, performing of copyrighted material including, but not limited to, digitisation and distribution of computer software, television, radio, streaming services, websites, photographs, magazines, books, music or any copyrighted sources and installation of any copyrighted software for which the School does not have an active license or explicit permission of the copyright owner, is strictly prohibited. 2.1.5 Authoring or sending material any form of electronic communications or messages, including, but not limited to, messages and emails that is pornographicwere unsolicited and may be considered junk mail, offensive"chain letters", obscene hoax warnings or otherwise inappropriate; • Activity which defames or disparages advertising, and that do not correctly identify you as the schoolsender, or risks bringing messages which appear to originate from another person. 2.1.6 Unauthorised transmission, distribution, discussion or disclosure of information gained through a user’s presence within the Trust into disrepute; • Inappropriate sharing School or through the use of confidential information IT Facilities. 2.1.7 Connecting any non-approved IT device, system or data about service (including wireless access points) to school networks or setting up any network services, without the Trustexplicit or delegated permission from Authorised Personnel. 2.1.8 Unauthorised access (or attempted unauthorised access) to any IT Facilities provided by the School. 2.1.9 Allowing, its pupilsinciting, encouraging or enabling others to gain or attempt to gain unauthorised access to the IT Facilities. 2.1.10 Causing any damage to IT Facilities, including through the consumption of food or drink, or other members of moving or removing such facilities without authorisation. The School reserves the MITRE community; • Connecting right to charge for any device damage caused. 2.1.11 Attempting to the MITRE’s modify, alter or in any way interfere with IT network without approval from MITRE’s IT team; • Setting up any facility security controls, hardware or software, applications configurations, settings, equipment, data files or web services on MITRE’s network websites without approval the written authorisation or delegated permission from Authorised Personnel. 2.1.12 Introduction of unauthorised and/or malicious software or programs into the IT Facilities, including, but not limited to: unlicensed software, viruses, worms, Trojan horses or logic bombs; by authorised personneldownloading, or creating or using any program, tool or item of software designed to monitor damage, disrupt or interfere with the functioning of the ICT facilitiesIT Facilities, user accounts or data; • Gaining. 2.1.13 Effecting security breaches or disruptions of network communication, including, but not limited to, accessing or modifying data (or data headers) of which the user is not an intended recipient or logging into an IT system or service, or attempting account, that the user is not expressly authorised to gainaccess. Disruption includes, access to restricted areas but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information. 2.1.14 Executing any form of network monitoring including any data capture, port scanning or security scanning without written authorisation or delegated permission from Authorised Personnel. 2.1.15 Registering for any system or service, including, but not limited to, social media accounts, web applications, domain names, which includes the name of the networkschool or any similar name, or to any password-protected information, without approval from authorised personnel; • Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access abbreviation that may mislead the public into believing that the domain name refers to the school’s or Trust’s ICT facilities; • Causing intentional damage or defacing (including stickers) ICT equipment and facilities; • Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel; • Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation; • Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory . 2.1.16 Acting in any other way; • Using inappropriate way that directly or offensive language; • Promoting a private business, unless that business is directly related indirectly causes disruption to others’ use of School IT Facilities or using IT Facilities to disrupt or deny the Trust operations; and you have express permission to do so. • Using websites or mechanisms to bypass filtering or monitoring mechanisms; • Using AI tools and generative large language models (such as GPT-3): o During assessments, including internal and external assessments, and coursework; o To write the homework or assignments, where AI-generated text or imagery is presented as their own work (unless explicitly permitted); o When exposing personal, sensitive or intellectual property data or information This is not an exhaustive list. MITRE reserves the right to amend this list use of IT Facilities of third parties at any time. The CEOI understand that I must use Xxxxxxxxx Woodville School systems in a responsible way, COO to ensure that there is no risk to my safety or Head to the safety and security of IT the systems and other users. • I understand thatthe School systemsand devices are primarily intended foreducational use and that I will not use their professional judgement to determine whether any act them for personal or behaviour not on recreational use unless I have prior permission; • I understand that the list above is considered unacceptable School may monitor my use of the devices, systems, services and communications at any time; • I will keep my username and password safe and secure – I will not share it, nor will I try to use any other person’s username and password. I understand that I should not write down or store a password where it is possible that someone may steal it; • I will not disclose or share personal information about others when on-line (this could include names, addresses, email addresses, telephone numbers, age, gender, educational details, financial details etc.…); • I willimmediately report any unpleasant or inappropriate materialor messages oranything that makes me feel uncomfortable when I see it on-line; • I will not open any hyperlinks in emails or any attachments to emails, unless I know and trust the person/organisation who sent the email, or if I have any concerns about the validity of the email (due to the risk of the attachment containing viruses or other harmful programs); • I will respect others’ work and property and will not access, copy, remove or otherwise use or alter anyotheruser’s files, withouttheowner’sknowledge and permission, and Iwill ensure that anyuse is in accordance with school policies; • I understand there are risks when using the systems and services, and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programs or software that might allow me to bypass the filtering/security systems in place to prevent access to such materials; • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions; • I will respect copyright of materials and intellectual property rights and not take or distribute text, images or other materials without permission; • I will not use or modify any of the School devices, systems and services in any way that willdisrupt their use for others in any way; • I will not install or attempt to install or store programmes of any typeon any School device,nor will I try to alter computer settings; • I understand that I am not permitted to attempt to connect any devices or systems (e.g. laptops, mobile phones, USB devices, etc.…) to any school devices, systems or services without prior permission from an Authorised Person within the school. I understand that, if I am permitted to use my own devices in the school I will follow the rules set out in this agreement, in the same way as if I was using schoolequipment. • I understand that I am responsible for my actions, both inside and outside of the school: • I understand that the school also has the right to take action against me if I am involved in incidents of inappropriate behaviour, that are covered in this agreement, when I am out of the school and where they involve my membership of the school community (for example, cyber- bullying, use of images or personal information). • I understand that if I fail to comply with this Acceptable Use Policy Agreement, I will be subject to disciplinary action. This may include loss of access to the school IT systems and services, disciplinary action as set out in the codes of conduct and in the event of illegal activities involvement of the police. I agree to follow these guidelines at all times when: • using or connected to the School’s devices, systems and services; • using my own equipment inside or Trust’s ICT facilitiesoutside of the school in a way that is related to me being a member of this school (for example, communicating with other members of the school, accessing school email, websites, remote learning and services, etc.…).

Appears in 1 contract

Samples: It Acceptable Use Policy and Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!