Unauthorized Access to School Networks Sample Clauses

Unauthorized Access to School Networks. Harassment and Threats via Electronic Media, and the Use of Technology to Facilitate Other Crimes Unauthorized access to school networks is a prosecutable offense under N.J.S.A. 2C:20-23 et seq. Any damage to the network may result in more severe penalties. School officials may consider unauthorized accessing of a school network to be an internal matter and not advise law enforcement authorities. However, law enforcement personnel are specially trained in forensic computer analysis. The ability to accurately assess the level of intrusion into a computer system is best handled by law enforcement professionals. Often the significance of an attack on the integrity of a school computer network can extend into the community. The ability of law enforcement to quantify any unauthorized use or access can bring peace of mind to concerned citizens in the community. Accordingly, when notification to law enforcement is appropriate, notification should be made to law enforcement immediately upon learning of unauthorized access. In addition to accessing computer systems, it has unfortunately become commonplace for juveniles to utilize electronic forms of communication to harass and threaten other students or individuals. The mere fact that the communication is in electronic form, rather than oral or written form is irrelevant. School personnel should be guided by the reporting obligations elsewhere in this agreement. School personnel should be mindful of the fact that forensic computer analysis of an individual computer or network can result in valuable evidence for an investigation. Therefore, when notification to law enforcement is appropriate, the entirety of the investigation should be conducted by law enforcement so as not to compromise the integrity of potential evidence. Finally, computers and other forms of current and emerging technology may be used to facilitate other criminal activity. Financial information, identifying information and illicit images may all be contained on a suspect’s computer. Therefore, it is vital that law enforcement be notified immediately when a school learns that a juvenile may be using a computer to violate the law. Similarly, cell phones, smart phones, tablets, PDAs and other electronic communication devices should be turned over to the police, not parents, when the school comes into possession of items which they suspect may contain evidence of criminal behavior. For any offense committed on media, reporting should be guided by Art...
AutoNDA by SimpleDocs
Unauthorized Access to School Networks. Harassment and Threats via Electronic Media, and the Use of Technology to Facilitate other Crimes. 21

Related to Unauthorized Access to School Networks

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Authorized Users Authorized Users" are:

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

Time is Money Join Law Insider Premium to draft better contracts faster.