Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy are the following: A. Uses that violate the law or encourage others to violate the law. Do not transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited by the school district’s student discipline policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user should assume that all materials are protected unless there is explicit permission on the materials to use them. B. Uses that cause harm to others or damage to their property. For example, do not engage in defamation (harming another's reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems. C. Uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not disclose or share your password with others; do not impersonate another user. D. Uses that are commercial transactions. Students, staff, and other users may not sell or buy anything over the Internet. The user should not give others private information about the user or others, including credit card numbers and social security numbers.
Appears in 4 contracts
Samples: School Handbook, Student Handbook, School Handbook
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:
A. 1) Uses that violate the law or encourage others to violate the law. Do not .
a) Don’t transmit offensive or harassing messages; .
b) Don’t offer for sale or use any substance the possession or use of which is prohibited by the school districtDistrict’s student discipline policy; Student Discipline Policy.
c) Don’t view, transmit or download pornographic materials or materials that encourage others to violate the law; .
d) Don’t intrude into the networks or computers of others; and .
e) Don’t download or transmit confidential, trade secret information, information or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. 2) Uses that cause harm to others or damage to their property. For example, do not .
a) Don’t engage in defamation (harming another's ’s reputation by lies); .
b) Don’t employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; .
c) Don’t upload a worm, a virus, a “Trojan horseHorse,” a “time bomb,” or any other harmful form of programming or vandalism; .
d) Don’t participate in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems.
C. e) Do not download or install a program or software without permission from an authorized school official.
3) Uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not .
a) Don’t disclose or share your password with others; do not .
b) Don’t impersonate another user.
D. 4) Uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the InternetInternet nor use the computer and/or network for financial gain or illegal activity. The user You should not give others private information about the user you or others, including credit card numbers and social security Social Security numbers.
Appears in 3 contracts
Samples: Acceptable Use Policy, Acceptable Use Policy, Acceptable Use Policy
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. Uses i. uses that violate the law or encourage others to violate the law. Do not , transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited prohibited, by the school districtSchool’s student discipline policyStudent Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses ii. uses that cause harm to others or damage to their property. For example, do not don't engage in defamation (harming another's reputation by lies); employ another’s 's password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan "trojan horse,” “" "time bomb,” " or other harmful form of programming or vandalism; participate in “"hacking” " activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses iii. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don't disclose or share your password with others; do not don't impersonate another user.
D. Uses iv. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 2 contracts
Samples: Ipad Loan Agreement, Ipad Loan Agreement
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. Uses a. uses that violate the law or encourage others to violate the law. Do not , transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited prohibited, by the school districtSchool’s student discipline policyStudent Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses b. uses that cause harm to others or damage to their property. For example, do not don't engage in defamation (harming another's reputation by lies); employ another’s 's password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan "trojan horse,” “" "time bomb,” " or other harmful form of programming or vandalism; participate in “"hacking” " activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses c. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don't disclose or share your password with others; do not don't impersonate another user.
D. Uses d. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 2 contracts
Samples: Chromebook Use Agreement, Ipad Loan Agreement
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. Uses 1. uses that violate the law or encourage others to violate the law. Do not Don’t transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited by the school districtSchool District’s student discipline policyPolicy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses 2. uses that cause harm to others or damage to their property. For example, do not don’t engage in defamation (harming another's reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses 3. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don’t disclose or share your password with others; do not don’t impersonate another user.
D. Uses 4. uses that are commercial transactions. Students, staff, and other users Users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
5. the downloading of any executable file or the downloading of any material that is not directly related to a task relating to your assignments.
Appears in 1 contract
Samples: Device Agreement
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. Uses a. uses that violate the law or encourage others to violate the law. Do not , transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited prohibited, by the school district’s student discipline policySchool District's Student Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses b. uses that cause harm to others or damage to their property. For example, do not don't engage in defamation (harming another's reputation by lies); employ another’s 's password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan "trojan horse,” “" "time bomb,” " or other harmful form of programming or vandalism; participate in “"hacking” " activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses c. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don't disclose or share your password with others; do not don't impersonate another user.
D. Uses d. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 1 contract
Samples: Ipad Loan Agreement
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:
A. Uses that violate the law or encourage others to violate the law. Do not transmit ; transmitting offensive or harassing messages; offer offering for sale or use any substance the possession or use of which is prohibited by the school district’s student discipline policycode of conduct; viewviewing, transmit transmitting or download downloading pornographic materials or materials that encourage others to violate the law; intrude intruding into the networks or computers of others; others and download downloading or transmit transmitting confidential, /trade secret information, information or copyrighted copy written materials. Even if materials on the networks network are not marked with the copyright symbol, the user you should assume that all materials are protected protected, unless there is explicit permission on the materials to use them.;
B. Uses that cause harm to others or damage to their property. For example: e.g., do not engage in defamation (harming another's reputation by lies); employ another’s defamation, identity theft, using a password or some other user identifier that misleads message recipients into believing that someone other than the user is communicating or otherwise using his/her access to the network or the Internet; upload your own, uploading a worm, virus, “Trojan horse,” “time bomb,” virus or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networksmalware, or information systems.unauthorized access;
C. Uses that jeopardize the security of student and staff access and to any network: i.e., use of the computer network or other networks on the Internet. For example, do not disclose or share your password with others; do not impersonate another user.proxies;
D. Uses that are commercial transactions. Students, staff, involve buying and other users may not sell or buy anything selling over the Internetinternet;
E. Uses of forums other than those approved for educational purposes;
F. Uses for political, commercial, illegal, financial, and/or religious purposes;
G. Uses of threatening, profane, harassing or abusive language;
H. Uses that involve accessing pornographic or obscene materials, or using or sending profanity in messages;
I. Uses that involve all forms of harassment in cyberspace, often called cyberbullying. The user should This includes, but is not give others private information about limited to: harassing, teasing, intimidating, threatening, or terrorizing another person by e-mail messages, instant messages, text messages, digital pictures or images, or website postings (including blogs). All reports of harassment in cyberspace will be investigated fully.
J. Uses that reveal the user student’s personal home address or others, including credit card numbers and social security numbersphone number or those of other students or colleagues.
Appears in 1 contract
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. Uses a. uses that violate the law or encourage others to violate the law. Do not , transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited prohibited, by the school district’s student discipline policySchool District's Student Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses b. uses that cause harm to others or damage to their property. For example, do not don't engage in defamation (harming another's reputation by lies); employ another’s 's password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan "trojan horse,” “" "time bomb,” " or other harmful form of programming or vandalism; participate in “"hacking” " activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses c. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don't disclose or share your password with others; do not don’t impersonate another user.
D. Uses d. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 1 contract
Samples: Chromebook Loan Agreement
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Agreement are the following:
A. Uses 1. uses that violate the law or encourage others to violate the law. Do not Don’t transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited by the school districtCrestview Local School District’s student discipline policyStudent Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses 2. uses that cause harm to others or damage to their property. For example, do not don’t engage in defamation (harming another's ’s reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems.
C. Uses 3. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don’t disclose or share your password with others; do not don’t impersonate another user.
D. Uses 4. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 1 contract
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Agreement are the following:
A. Uses 1. uses that violate the law or encourage others to violate the law. Do not Don’t transmit offensive or harassing messages; offer offers for sale or use any substance the in possession or use of which is prohibited by the school districtSchool District’s student discipline policyStudent Discipline Agreement; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. Uses 2. uses that cause harm to others or damage to their property. For example, do not don’t engage in defamation (harming another's ’s reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computers, networksnetworks , or information systems.
C. Uses 3. uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don’t disclose or share your password with others; do not don’t impersonate another user.
D. Uses 4. uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 1 contract
Unacceptable Uses of Network. Among the uses that are considered unacceptable and which constitute a violation of this policy Policy are the following:
A. 1. Uses that violate the law or encourage others to violate the law. Do not Don’t transmit offensive or harassing messages; offer for sale or use any substance the possession or use of which is prohibited by the school districtSchool District’s student discipline policyStudent Discipline Policy; view, transmit or download pornographic materials or materials that encourage others to violate the law; intrude into the networks or computers devices of others; and download or transmit confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, the user you should assume that all materials are protected unless there is explicit permission on the materials to use them.
B. 2. Uses that cause harm to others or damage to their property. For example, do not don’t engage in defamation (harming another's ’s reputation by lies); employ another’s password or some other user identifier that misleads message recipients into believing that someone other than the user you is communicating or otherwise using his/her access to the network or the Internet; upload a worm, virus, “Trojan trojan horse,” “time bomb,” or other harmful form of programming or vandalism; participate in “hacking” activities or any form of unauthorized access to other computersdevices, networks, or information systems.
C. 3. Uses that jeopardize the security of student and staff access and of the computer network or other networks on the Internet. For example, do not don’t disclose or share your password with others; do not don’t impersonate another user; don’t connect wireless devices to the network or attempt to intercept wireless communications.
D. 4. Uses that are commercial transactions. Students, staff, Students and other users may not sell or buy anything over the Internet. The user You should not give others private information about the user you or others, including credit card numbers and social security numbers.
Appears in 1 contract
Samples: Device User Agreement