Acceptable Computer and Internet Use Sample Clauses

Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or guardian permission is sought to give the student(s) access to the internet, based upon the policy contained within Information and Communication Technology (ICT) Procedure. xxxx://xxx.xxx.xxx.xxx.xx/xxxx/xxx/xxxxxxxxxx/Xxxxxxxxx%00Xxxxxxxxxxx/Xxxxxxxxxxx%00Xxxxxxxxxxxxx%00xxx %20Technology/advice.DOCX Communication through internet and online communication services must comply with the Responsible Behaviour Plan available on the school website. Note: Use of internet and online communication services can be audited and traced to the account of the user.
AutoNDA by SimpleDocs
Acceptable Computer and Internet Use. 4.1 Students are not to create, participate in, or circulate content that attempts to undermine, hack into and/or bypass the hardware and software security mechanisms that are in place.
Acceptable Computer and Internet Use. Upon enrolment in a Queensland Government school, parental or caregiver permission is sought to give the student(s) access to the internet, based upon the relevant policies of Education Queensland. Communication through internet and online communication services must comply with the Student Code of Conduct available on the school website. There are conditions that students are required to adhere to. Students should not: • create, participate in or circulate content that attempts to undermine, hack into and/or bypass the hardware and/or software security mechanisms that are in place • disable settings for virus protection, spam and/or internet filtering that have been applied as part of the school standard • use unauthorised programs or intentionally download unauthorised software, graphics or music • intentionally damage or disable computers, computer systems or Queensland DET networks • use the device for unauthorised commercial activities, political lobbying, online gambling or any unlawful purpose. Note: Students’ use of Internet and online communication services may be audited at the request of appropriate authorities for investigative purposes surrounding inappropriate use. Passwords • Passwords must not be obvious or easily guessed; they must be kept confidential, and changed when prompted or when known by another user. • Personal accounts cannot be shared. Students should not allow others to use their personal account for any reason. Students should log off at the end of each session to ensure no one else can use their account or laptop. Digital Citizenship • Students should be conscious creators of the content and behaviours they exhibit online and take active responsibility for building a positive online reputation. They should be conscious of the way they portray themselves, and the way they treat others online. • Students should be mindful that the content and behaviours they have online are easily searchable, accessible and may form a permanent online record into the future. • Interactions within digital communities and environments should mirror normal interpersonal expectations and behavioural guidelines, such as when in a class or the broader community. • Parents are requested to ensure that their child understands this responsibility and expectation. The school’s behaviour policies also support students by providing school related expectations, guidelines and consequences.
Acceptable Computer and Internet Use. Federal law prohibits misuse of computer resources, and students using computers and/or internet access provided by CGTC are responsible for good behavior online, just as they are in a classroom or other area of the College. Complete information regarding acceptable use of computer and internet resources, as well as a list of computer crimes prohibited by state law in Georgia, are available in the student catalog. Reference: TCSG Procedure 3.3.
Acceptable Computer and Internet Use. Communication through internet and online communication services must comply with the Department’s Code of School Behaviour and the Responsible Behaviour Plan available on the school website. Students should be aware that they are held responsible for their actions while using the internet and online communication services. Students will be held responsible for any breaches caused by other person(s) knowingly using their account to access internet and online communication services. The misuse of internet and online communication services may result in disciplinary action which includes, but is not limited to, the withdrawal of access to services. Note: Use of internet and online communication services can be audited and traced to the account of the user.

Related to Acceptable Computer and Internet Use

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

Time is Money Join Law Insider Premium to draft better contracts faster.