Unacceptable Use Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Online gambling, inappropriate advertising, phishing and/or financial scams Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate or harmful Consensual and non-consensual sharing of nude and semi-nude images and/or videos and/or livestreams Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its students, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any programme, tool or item of software designed to interfere with the functioning of the school’s ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to the school’s ICT facilities Removing, deleting or disposing of the school’s ICT equipment, systems, programmes or information without permission from authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not permitted by authorised personnel to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering or monitoring mechanisms Engaging in content or conduct that is radicalised, extremist, racist, antisemitic or discriminatory in any other way Inappropriate use of AI tools and generative chatbots (such as ChatGPT and Google Bard) to generate text or imagery presented as original work. This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other relevant member of the SLT will use their professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.
Acceptable Use You agree that you are independently responsible for complying with all applicable laws in all of your activities related to your use of the Service, regardless of the purpose of the use, and for all communications you send through the Service. We and our Service Providers have the right but not the obligation to monitor and remove communications content that we find in our sole discretion to be objectionable in any way. In addition, you are prohibited from using the Service for communications or activities that: (a) violate any law, statute, ordinance or regulation; (b) promote hate, violence, racial intolerance, or the financial exploitation of a crime; (c) defame, abuse, harass or threaten others; (d) include any language or images that are bigoted, hateful, racially offensive, vulgar, obscene, indecent or discourteous; (e) infringe or violate any copyright, trademark, right of publicity or privacy or any other proprietary right under the laws of any jurisdiction; (f) impose an unreasonable or disproportionately large load on our infrastructure; (g) facilitate any viruses, trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or information; (h) constitute use of any robot, spider, other automatic device, or manual process to monitor or copy the Service or the portion of the Site through which the Service is offered without our prior written permission; (i) constitute use of any device, software or routine to bypass technology protecting the Site or Service, or interfere or attempt to interfere, with the Site or the Service; or (j) may cause us or our Service Providers to lose any of the services from our internet service providers, payment processors, or other vendors. We encourage you to provide notice to us by the methods described in Section 6 of the General Terms above of any violations of the General Terms or the Agreement generally.
Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or
ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service(to the extent that such use is not licensed by this XXXX); (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.
Acceptable Use Policy With respect to the Cloud Service, Customer will not: (a) disassemble, decompile, reverse-engineer, copy, translate or make derivative works, (b) transmit any content or data that is unlawful or infringes any intellectual property rights, or (c) circumvent or endanger its operation or security.
Activities of the Manager The services of the Manager to the Fund hereunder are not to be deemed exclusive, and the Manager and any of its affiliates shall be free to render similar services to others. Subject to and in accordance with the Agreement and Declaration of Trust and By-Laws of the Trust and Section 10(a) of the 1940 Act, it is understood that trustees, officers, agents and shareholders of the Trust are or may be interested in the Manager or its affiliates as directors, officers, agents or stockholders; that directors, officers, agents or stockholders of the Manager or its affiliates are or may be interested in the Trust as trustees, officers, agents, shareholders or otherwise; that the Manager or its affiliates may be interested in the Fund as shareholders or otherwise; and that the effect of any such interests shall be governed by said Agreement and Declaration of Trust, By-Laws and the 1940 Act.
CHARACTERISTICS OF THE ACADEMY The characteristics of the Academy set down in Section 1(6) of the Academies Act 2010, are that:
Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition. 1.2. User shall not publish, retransmit, display, redistribute, reproduce or commercially exploit the Data in any form, except that User may include limited excerpts from the Data in articles, reports and other documents describing the results of User’s linguistic education and research.
Approved User A user approved by the relevant Data Access Committee(s) to access one or more datasets for a specified period of time and only for the purposes outlined in the Principal Investigator (PI)’s approved Research Use Statement. The Information Technology (IT) Director indicated on the Data Access Request, as well as any staff members and trainees under the direct supervision of the PI are also Approved Users and must abide by the terms laid out in the Data Use Certification Agreement.
Other Activities of the Adviser The services of the Adviser to the Corporation are not exclusive, and the Adviser may engage in any other business or render similar or different services to others including, without limitation, the direct or indirect sponsorship or management of other investment based accounts or commingled pools of capital, however structured, having investment objectives similar to those of the Corporation, so long as its services to the Corporation hereunder are not impaired thereby, and nothing in this Agreement shall limit or restrict the right of any manager, partner, member (including its members and the owners of its members), officer or employee of the Adviser to engage in any other business or to devote his or her time and attention in part to any other business, whether of a similar or dissimilar nature, or to receive any fees or compensation in connection therewith (including fees for serving as a director of, or providing consulting services to, one or more of the Corporation’s portfolio companies, subject to applicable law). The Adviser assumes no responsibility under this Agreement other than to render the services called for hereunder. It is understood that directors, officers, employees and stockholders of the Corporation are or may become interested in the Adviser and its affiliates, as directors, officers, employees, partners, stockholders, members, managers or otherwise, and that the Adviser and directors, officers, employees, partners, stockholders, members and managers of the Adviser and its affiliates are or may become similarly interested in the Corporation as stockholders or otherwise.