Unacceptable Uses Sample Clauses

Unacceptable Uses. A. The following uses of the school district system and Internet resources or accounts are considered unacceptable: 1. Users will not use the school district system to access, review, upload, download, store, print, post, receive, transmit or distribute: a. pornographic, obscene or sexually explicit material or other visual depictions that are harmful to minors; b. obscene, abusive, profane, lewd, vulgar, rude, inflammatory, threatening, disrespectful, or sexually explicit language; c. materials that use language or images that are inappropriate in the education setting or disruptive to the educational process; d. information or materials that could cause damage or danger of disruption to the educational process; e. materials that use language or images that advocate violence or discrimination toward other people (hate literature) or that may constitute harassment or discrimination. 2. Users will not use the school district system to knowingly or recklessly post, transmit or distribute false or defamatory information about a person or organization, or to harass another person, or to engage in personal attacks, including prejudicial or discriminatory attacks. 3. Users will not use the school district system to engage in any illegal act or violate any local, state or federal statute or law. 4. Users will not use the school district system to vandalize, damage or disable the property of another person or organization, will not make deliberate attempts to degrade or disrupt equipment, software or system performance by spreading computer viruses or by any other means, will not tamper with, modify or change the school district system software, hardware or wiring or take any action to violate the school district’s security system, and will not use the school district system in such a way as to disrupt the use of the system by other users. 5. Users will not use the school district system to gain unauthorized access to information resources or to access another person’s materials, information or files without the implied or direct permission of that person. 6. Users will not use the school district system to post private information about another person, personal contact information about themselves or other persons, or other personally identifiable information, including, but not limited to, addresses, telephone numbers, school addresses, work addresses, identification numbers, account numbers, access codes or passwords, labeled photographs or other information th...
AutoNDA by SimpleDocs
Unacceptable Uses. The unacceptable uses of the system by staff members include: a. Using the system for unlawful, unprofessional or commercial purposes. Unlawful use can include sexual, religious, ethnic or racial harassment, hate mail, defamation, sexual exploitation of minors, and copyright infringement. b. Staff may not disclose personally identifiable student contact information for uses other than District business. This includes student photographs, home, school, or work addresses or telephone numbers, social security numbers, and credit card numbers c. Activities that are destructive to the system are prohibited. These activities include: creating or propagating computer viruses, overloading the school's computer network by spamming (intentionally sending an unnecessary or annoying message to a large number of people), or hacking (intentionally breaking into restricted areas of computer networks). d. Use of the system to access, store, or distribute obscene or pornographic material. e. Destroying, modifying, or abusing software or hardware components of the system. f. The unauthorized installation, use, storage, or distribution of copyrighted software or materials on system computers is prohibited. g. Network equipment (switches, routers, etc.) and software will be connected and maintained by District Network personnel only. Any unauthorized equipment found connected to the District network will be confiscated. h. Use of the network for political or religious causes, solicitation, advertising, personal gain, or personal fundraising. Political purposes include promotion or negation of a point of view in any local, state, or national election – whether it is for a candidate or about an issue, including school finance elections.
Unacceptable Uses. Improper use of the DCPS Network is prohibited. Actions that constitute unacceptable uses of the DCPS Network and are not specifically addressed elsewhere in this procedure include, but are not limited to: 1. Use of the DCPS Network for, or in support of, any illegal purposes. 2. Use of the DCPS Network for, or in support of, any obscene or pornographic purposes including, but not limited to, the retrieving or viewing of any sexually explicit material. If an authorized user inadvertently accesses such information, s/he should immediately disclose the inadvertent access to a teacher or to the school Principal. This will protect the user against allegations of intentionally violating this procedure. 3. Use of the DCPS Network for soliciting or distributing information with the intent to incite violence, cause personal harm or bodily injury, or to harass or “stalk” another individual. 4. Non-educational uses of the DCPS Network including, but not limited to games, wagering, gambling, junk mail, chain letters, jokes, private business activities, raffles, fundraisers, religious activities or political lobbying. 5. Use of profanity, obscenity or language that is generally considered offensive or threatening to persons of a particular race, gender, religion, sexual orientation, or to persons with disabilities. 6. Plagiarizing any information gained on or through use of the DCPS Network or any other network access provider.
Unacceptable Uses. The following uses of ICT are considered unacceptable:
Unacceptable Uses. Among the uses that are considered unacceptable and which constitute a violation of this Policy are the following: 1) Uses that violate the law or encourage others to violate the law. Don’t sell drugs, alcohol, or tobacco. Don’tpromote unethical practices or any activity prohibited by law or Board Policy. Don’t view, transmit, or download pornographic materials or materials that encourage others to violate the law. Don’t intrude into the networks or computers of others. Don’t download or transmit confidential or trade secret information. 2) Copyrighted material may not be placed on the system without the author’s permission. Even if materials on the networks are not marked with the copyright symbol, you should assume that all materials are protected unless there is explicit permission on the materials to use them. 3) Users shall not view, download, or transmit material that is threatening, offensive, obscene, disruptive, or sexually explicit or that could be construed as harassment, bullying, or disparagement of others based on their race, national origin, ancestry, citizenship status, sex, sexual orientation, gender identity, age, disability, religion, military status, political beliefs, or any other personal or physical characteristics. 4) Vandalism results in the cancellation of user privileges. Vandalism includes uploading/downloading anyinappropriate material, creating computer viruses, and/or any malicious attempt to harm or destroy equipment or materials or the data of any other user. Toledo Public Schools Adopted June 2010 Modified February 2017 Office of Educational Technology Page #1 5) Users shall not read another users’ mail or files. Users shall not attempt to interfere with another users’ ability to send or receive e-mail, nor shall they attempt to read, delete, copy, modify, or forge another users’ mail. 6) No user may sell or buy anything over the Internet. Private information about you or others, including addresses, phone numbers, Social Security numbers, and credit card numbers should not be given to others. 7) Students are prohibited from attempting to bypass the District’s filtering system. The use of a “Web Proxy” site is prohibited. 8) Any other uses deemed unacceptable by the District
Unacceptable Uses. Disrupting the CMS network • Introducing (or attempting to introduce) viruses into the network • Hacking • Asking other people to do things that are illegal • Looking at material that is threatening or pornographic • Using profanity, words that hurt or threaten other people • Sending messages or images about sex • Copying the work of other people/plagiarism • Use of Artificial Intelligence (AI) for unethical uses as outlined in the Code of Conduct, S-SINT, and S-SINT/R • Selling things • Working for a political candidate • Sending chain letters or asking for money (phishing) • Posting pictures of a student or schoolwork without permission • Giving out personal information about other students or staff without their permission • Forwarding e-mail without the permission of the author • Giving out information that belongs to a company without permission LEVEL 1: Conference LEVEL 2: Intervention LEVEL 3: Suspension for 1–5 days LEVEL 4: Suspension for 6–10 days Form # TXTBK | 6/2024 1 STUDENT LAST NAME STUDENT FIRST NAME GRADE STUDENT ID PARENT/GUARDIAN LAST NAME PARENT/GUARDIAN FIRST NAME DATE I am being issued a Charlotte-Mecklenburg Schools (CMS) device and charger. I agree to keep these items safe and well maintained. I will follow the guidelines for care of the device as explained below. SECURITY RULES AND REGULATIONS • I agree to keep track of where my assigned device is at all times. • I will never leave my assigned device unattended. It must be properly secured when not in use. • I understand that I am not permitted to loan my assigned device to anyone under any circumstances. • I acknowledge that the assigned device is equipped with security features for tracking purposes and that my usage will be monitored. • I will prioritize my personal safety and exercise discretion when using the device, avoiding actions that may attract unwanted attention.
Unacceptable Uses. Examples of unacceptable use include, but are not limited to, the following:
AutoNDA by SimpleDocs
Unacceptable Uses. The Laptop computer must not be used as follows: (1) for personal gain or the advancement of individual views; (2) to express personal opinions on the Intranet of Internet; (3) to solicit any non-School business or activities; or (4) to play games. Furthermore, a User must not send e-mail or other communications that either mask personal identity or indicate that someone else sent it. The User may only access the libraries, files, data, programs, and directories that are School-related. Unauthorized review, duplication, dissemination, removal, installation, damage, or alteration of files, passwords, computer systems or programs, or other property of School, or improper use of information obtained by unauthorized means, is prohibited. Sending, saving, or viewing offensive material is also strictly prohibited. Messages stored and/or transmitted by the Laptop computer must not contain content that may reasonably be considered offensive. Offensive material includes, but is not limited to, sexual comments, jokes or images, racial slurs, gender specific comments, or any comments, jokes or images that would offend someone on the basis of his or her race, color, religion, sex, age, national origin or ancestry, physical or mental disability, veteran status, as well as any other category protected by federal, state, or local laws.
Unacceptable Uses. A. Using the Internet in a manner that would violate any federal, state, or local statute, regulation, rule or policy. B. Using threatening, defamatory, discriminatory, or harassing language or language that constitutes a criminal offense, or that is detrimental to or in opposition to the NASD’s educational mission in any e-mail message or other Internet communication. C. Displaying or downloading any kind of sexually explicit offensive image or document. In addition, sexually offensive material may not be archived, stored, distributed, edited, or recorded using NASD’s network or computing resources. D. Knowingly engaging in any activity that could result in damage to NASD technology. X. Xxxxxxx passwords or assigned accounts, without the express authorization of the NASD. F. Engaging in activities designed to, or that might reasonably be foreseen to, expose NASD technology or other computers to computer viruses, other harmful software, or other injury or damage. G. E-mailing or instant messaging students who are unrelated to the User for non-school business- related reasons. School business use of instant messaging software or chat rooms for communication with students should only be done with the authorization of the NASD. H. Downloading, using or distributing pirated software or data and downloading, using or distributing any software that is not authorized by the NASD. I. Unauthorized copying, downloading, or distributing of copyrighted software or materials. This includes, but is not limited to: e-mail, text files, program files, image files, database files, sound files, music files, and video files. J. Providing private and/or confidential information about any individual other than the User, or the User’s immediate family, over NASD technology for non-school business use. K. Using NASD technology to transmit or display material confidential to NASD to uninvolved parties without the authorization of the NASD. This includes material posted in chat rooms, newsgroups, blogs, or other public forums. L. Downloading entertainment software or games, except where the User obtains the prior written authorization of the NASD. M. Installing and/or operating peer-to-peer software. N. Attempting to harm, maliciously modify, or destroy data that has been created by another.
Unacceptable Uses. The Internet, including social media, may not be used on school computers or resources for any of the following purposes: 1. Sexting - Sexting is prohibited by students. Those determined to have engaged in sexting shall be subject to discipline and possible criminal prosecution in accordance with all applicable laws; 2. To carry defamatory, discriminatory or obscene material; 3. In connection with any infringement of another person’s intellectual property rights (e.g., copyrights); 4. In connection with any attempt to penetrate computer or network security of any computer or other system or to gain unauthorized access (or attempted access) to any other person’s computer, e-mail or voice-mail accounts or equipment; or 5. In connection with the violation or attempted violation of any other law, rule, or regulation.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!