COMPUTER AND INTERNET ACCEPTABLE USE Sample Clauses

COMPUTER AND INTERNET ACCEPTABLE USE. Access to e-mail and the Internet will enable students to explore thousands of libraries, databases, and bulletin boards throughout the world. Families should be warned that material accessible via the Internet may contain items that are illegal, defamatory, inaccurate, or potentially offensive to some people. The intent is to make Internet access available to further educational goals and objectives. We believe that the benefits to students from access to the Internet, in the form of information resources and opportunities for collaboration exceed any disadvantages. But ultimately parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using media information sources. The school supports and respects each family’s right to decide whether or not to apply for access. Students are responsible for behavior on school computer networks just as they are in a classroom or school hallways. The network is provided for students to conduct research and communication with others. Access to network services is given to students who agree to act in a considerate and responsible manner. Parent permission is required. Access is a privilege – not a right. Access entails responsibility. Within reason, freedom of speech and access to information will be honored. During school, teachers will guide students toward appropriate materials. As outlined in the school policy and procedures the following guidelines must be followed: Computer Access:  The administration or teacher has the right to access information stored in any student file on any student screen, or student electronic mail.  Hardware or software shall not be damaged, modified or abused.  Intentionally altering the files, data or software on the school computers will be viewed as vandalism.  Loading software on any computer without authorization of the technology coordinator is forbidden.  Making copies of licensed or copyrighted software is illegal and therefore prohibited.  Using of or sharing another’s password is not allowed.  Before accessing the Internet, each student will receive instruction in the proper use of the online tools.  Students must notify teacher immediately of inappropriate material found.  Use of Internet without the knowledge and permission of a teacher or administrator is prohibited.  Students may not download programs.  Use of the Internet without a clearly defined educational objective understood by both studen...
AutoNDA by SimpleDocs

Related to COMPUTER AND INTERNET ACCEPTABLE USE

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Computer Systems (a) Servicer to operate systems The Servicer shall operate and maintain systems capable of providing data processing, management information and other related information technology requirements to enable it to carry out the Services.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified in Subparagraphs 19.1.1 to 19.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.