Unacceptable Use. The user is responsible for his or her actions and activities involving the network. Some examples of unacceptable uses are: a. Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any federal or state law; b. Unauthorized downloading of software, regardless of whether it is copyrighted or devised; c. Downloading copyrighted material for other than personal use; d. Using the network for private financial or commercial gain; e. Wastefully using resources, such as file space; f. Hacking or gaining unauthorized access to files, resources, or entities; g. Invading the privacy of individuals, which includes the unauthorized disclosure, dissemination, and use of information of a personal nature about anyone; h. Using another user’s account or password; i. Posting material authored or created by another, without his/her consent; j. Posting anonymous messages; k. Using the network for commercial or private advertising; l. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material; and m. Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Samples: Internet Access Conduct Agreement
Unacceptable Use. The user is responsible for his or her actions and activities involving the network. Some examples of unacceptable uses are:
a. : • Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any federal U.S. or state law;
b. ; • Unauthorized downloading of software, regardless of whether it is copyrighted or devised;
c. devirused; • Downloading copyrighted material for other than personal use;
d. ; • Using the network for private financial or commercial gain;
e. ; • Wastefully using resources, such as file space;
f. ; • Hacking or gaining unauthorized access to files, resources, or entities;
g. ; • Invading the privacy of individuals, which includes the unauthorized disclosure, dissemination, and use of information of a personal nature about anyone;
h. ; • Using another user’s account or password;
i. ; • Posting material authored or created by another, without his/her consent;
j. ; • Posting anonymous messages;
k. ; • Using the network for commercial or private advertising;
l. ; • Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material; and
m. and • Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Samples: Internet Access Conduct Agreement
Unacceptable Use. The user is responsible for his or his/her actions and activities involving the network. Some examples of unacceptable uses are:
a. A. Using the network for any illegal activity, including violation of copyright or other contracts, contracts or transmitting any material in violation of any state or federal or state law;
b. B. Unauthorized downloading of software, regardless of whether it is copyrighted or deviseddevirused;
c. C. Downloading copyrighted material for other than personal use;
d. D. Using the network for private financial or commercial gain;
e. E. Wastefully using resources, such as file space;
f. F. Hacking or gaining unauthorized access to files, resources, or entities;
g. G. Invading the privacy of individuals, which that includes the unauthorized disclosure, dissemination, and use of information about anyone that is of a personal nature about anyone;nature, including a photograph.
h. H. Using another user’s account or password;
i. I. Posting material authored or created by another, another without his/her consent;
j. J. Posting anonymous messages;
k. K. Using the network for commercial or private advertising;
l. L. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually sexually-oriented, threatening, racially offensive, harassing, or illegal material; and
m. M. Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Samples: Chromebook Agreement
Unacceptable Use. The user is responsible for his or her actions and activities involving the network. Some examples of unacceptable uses are:
a. Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any federal or state law;
b. Unauthorized downloading of software, regardless of whether it is copyrighted or deviseddevirused;
c. Downloading copyrighted material for any purpose other than personal use;
d. Using the network for private financial or commercial gain;
e. Wastefully using resources, such as file space;
f. Hacking or gaining unauthorized access to files, resources, or entities;
g. Invading the privacy of individuals, which includes the unauthorized disclosure, dissemination, and use of information of a personal nature about anyone;
h. Using another user’s account or password;
i. Posting material authored or created by another, without his/her consent;
j. Posting anonymous messages;
k. Using the network for commercial or private advertising;
l. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material; and
m. Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Samples: Employee Equipment Use, Internet Conduct, and Network Access Agreement
Unacceptable Use. The user is responsible for his or her actions and activities involving the network. Some examples of unacceptable uses are:
a. a) Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any federal or state law;
b. b) Unauthorized downloading of software, regardless of whether it is copyrighted or deviseddevirused;
c. c) Downloading copyrighted material for other than personal use;
d. d) Using the network for private financial or commercial gain;
e. e) Wastefully using resources, such as file space;
f. f) Hacking or gaining unauthorized access to files, resources, or entities;
g. g) Invading the privacy of individuals, which includes the unauthorized disclosure, dissemination, and use of information of a personal nature about anyone;
h. h) Using another user’s account or password;
i. i) Posting material authored or created by another, without his/her consent;
j. j) Posting anonymous messages;
k. k) Using the network for commercial or private advertising;
l. Accessing, submitting, posting, publishing, or displaying any defamatoryl) Defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material;
m) Utilizing a personal e-mail site without specific approval or direction from a staff member; and
m. n) Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Unacceptable Use. The user is responsible for his or his/her actions and activities involving the Internet network. Some examples of unacceptable uses are:
a. Using the network for any illegal activity, including violation of copyright or other contracts, or transmitting any material in violation of any federal U.S. or state lawState regulation;
b. Unauthorized downloading of software, regardless of whether it is copyrighted or deviseddevi- rused;
c. Downloading copyrighted material for other than personal use;
d. Using the network for private financial or commercial gain;
e. Wastefully using resources, such as file space;
f. Hacking or gaining Gaining unauthorized access to files, resources, resources or entities;
g. Invading the privacy of individuals, which includes the unauthorized disclosure, dissemination, and use of information of a personal nature about anyone;
h. Using another user’s account or password;
i. Posting material authored or created by another, another without his/her consent;
j. Posting anonymous messages;
k. Using the network for commercial or private advertising;
l. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, or illegal material; and
m. Using the network while access privileges are suspended or revoked.
Appears in 1 contract
Samples: Parent/Student Agreement