Unacceptable Uses of Network Sample Clauses

Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy are the following: A. Uses that violate the law or encourage others to violate the law. Do not transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited by the school district’s student discipline policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user should assume that all materials are protected unless there is explicit permission on the materials to use them. B. Uses that cause harm to others or damage to their property. For example, do not engage in defamation (harming another's reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems. C. Uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not disclose or share your password with others; do not impersonate another user. D. Uses that are commercial transactions. Students, staff, and other users may not sell or buy anything over the Internet. The user should not give others private information about the user or others, including credit card numbers and social security numbers.
AutoNDA by SimpleDocs
Unacceptable Uses of Network. Among the uses considered unacceptable and which constitute a violation of this Policy are the following: 1. Accessing, sending or displaying inappropriate, offensive or obscene messages or pictures, as determined to be inappropriate, offensive or obscene by the Administration. 2. Using obscene or inappropriate language, as determined to be inappropriate or Obscene by the Administration. 3. Xxxxxxxxx, insulting, threatening or attacking any individual. 4. Vandalizing and/or theft of computers, software, computer systems or computer networks. 5. Violating copyrights laws, such as, but not limited to: a. copying/downloading web sites to create another web site; b. copying a set of hypertext links exactly from another web site; c. copying graphics, i.e., Company Logos, Designs, Animations; or d. copying/downloading of any unauthorized program. 6. Using another person’s personal computer log-on identification. 7. Revealing your personal computer log-on identification or those of other students or staff members. 8. Sharing confidential information about other students or staff members. 9. Revealing your personal home address and/or personal phone numbers or the home address and/or personal phone numbers of other students or staff members. 10. Forwarding personal communication without the author’s prior consent. 11. Trespassing on others’ folders, work areas, storage areas or files. 12. Intentionally wasting limited resources, such as network time and/or consumables. 13. Employing the network for commercial purposes, such as running a business or buying and/or selling products via the internet. 14. Engaging in practices that threaten the network (e.g. uploading files that may introduce a virus, worm, or other harmful form of programming). 15. Participating in hacking activities or any form of unauthorized access to other computers, networks, or information systems. 16. The system shall not be used to encourage use of drugs, alcohol, tobacco, or promotion of unethical practices or activity prohibited by law or Board policy. 17. Promoting, supporting or celebrating religion or religious institutions. 18. Any act which would constitute a violation of any law, Board policy or the Student Code of Conduct.
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this Policy are the following: o uses that violate the law or encourage others to violate the law, transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited, by the School’s Student Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, you should assume that all materials are protected unless there is explicit permission on the materials to use them. o uses that cause harm to others or damage to their property. For example, don't engage in defamation (harming another's reputation by lies); employ another's password or some other user identifier that misleads message recipients into believing that someone other than you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, "trojan horse," "time bomb" or other harmful form of programming or ▪ vandalism; participate in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems. o uses that jeopardize the security of student access and of the computer network or other networks on the Internet. For example, don't disclose or share your password with others; don't impersonate another user. o uses that are commercial transactions. Students and other users may not sell or buy anything over the Internet. You should not give others private information about you or others, including credit card numbers and social security numbers.
Unacceptable Uses of Network. Adopted on: 12/13/21
Unacceptable Uses of Network. The following are considered examples of unacceptable uses and constitute a violation of this policy. Additional unacceptable uses can occur other than those specifically listed or enumerated herein: A. Uses that violate the law or encourage others to violate the law, including but not limited to transmitting offensive or harassing messages; offering for sale, use, or purchase any substance the possession or use of which is prohibited by the District’s student discipline policy, local, State, or federal law; viewing, transmitting, or downloading pornographic materials or materials that encourage others to violate local, State, or federal law; information pertaining to the manufacture of weapons; intruding into the networks or computers of others; and downloading or transmitting confidential, trade secret information, or copyrighted materials; B. Uses that cause harm to others or damage their property, person, or reputation, including but not limited to engaging in defamation (harming another’s reputation by lies); employing another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating; reading another person’s communications; sharing another person’s pictures, private information, or messages without their permission; or otherwise using his or her access to the network or the internet; C. Uploading a worm, virus, other harmful form of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or other information. Users will immediately notify the school's system administrator if they have identified a possible security problem. Users will not go looking for security problems, because this may be construed as an illegal attempt to gain access. D. Uses amounting to harassment, sexual harassment, bullying, or cyber-bullying defined as using a computer, computer system, or computer network to convey a message in any format, including audio or video, text, graphics photographic, or any combination thereof, that is intended to harm another individual. E. Uses that jeopardize the security of student access and of the computer network or other networks on the internet; uses that waste District resources including downloading very large files without permission from a teacher, unnecessary printing, and consuming excess file space on shared drives. F. Uses that are commercial transactions, including commercial or priv...
Unacceptable Uses of Network. The following are considered unacceptable uses and constitute a violation of this policy: a. Uses that violate the law or encourage others to violate the law, including but not limited to transmitting offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by NVA’s student discipline policy; viewing, transmitting or downloading pornographic materials or materials that encourage others to violate the law; intruding into the networks or computers of others; and downloading or transmitting confidential, trade secret information, or copyrighted materials. b. Uses that cause harm to others or damage to their property, including but not limited to engaging in defamation (harming another’s reputation by lies); employing another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating, or otherwise using his/her access to the network or the Internet; uploading a worm, virus, other harmful form of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or other information. c. Uses that jeopardize the security of student access and of the computer network or other networks on the Internet. d. Uses that are commercial transactions. Students and other users may not sell or buy anything over the Internet. Students and others should not give information to others, including credit card numbers and social security numbers. e. Students may be prohibited from using e-mail (except NVA e-mail accessed through a web browser) .E-mail access may be given to students on a case-by-case basis (e.g., foreign exchange students keeping in contact with home). Students are prohibited from joining chat rooms, unless it is a teacher-sponsored activity.
Unacceptable Uses of Network. The following uses are considered unacceptable: 1. Violating the law or encouraging others to violate the law. 2. Transmitting offensive or harassing messages including cyber-bullying. 3. Using NASD technology for a primarily commercial, social and/or entertaining nature, with no related educational purpose. 4. Using NASD technology to view, transmit or download pornographic or otherwise objectionable materials. 5. Using NASD technology to transmit confidential materials. Providing private information about oneself and any other individual over the Internet including credit card or social security numbers (unless for approved uses, such as college or employment applications). 6. Using NASD technology to download and/or use any program, partial program, peer-to-peer software or game. 7. Using the network to cause harm to others or their property. 8. Using the network to access, modify or destroy a file that has been created by another. 9. Sharing passwords or assigned accounts. 10. Knowingly engaging in activities that expose NASD technology to computer viruses, harmful software, or physical damage. 11. Hacking activities or circumventing security measures on school or remote computers. 12. Unauthorized copying, downloading, or distributing of copyrighted software or materials. This includes, but is not limited to: e-mail, text files, program files, image files, database files, sound files, music files, and video files.
AutoNDA by SimpleDocs

Related to Unacceptable Uses of Network

  • Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!