Examples of Inappropriate Use Sample Clauses

Examples of Inappropriate Use. Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking. • Disabling or attempting to disable any system monitoring or filtering or security measures. • Sharing user names and passwords with others; and/or borrowing someone else’s username, password, or account access. • Purposefully opening, viewing, using, or deleting files belonging to another system user without permission. • Electronically posting personal information about one’s self or others (i.e., addresses, phone numbers, and pictures). • Downloading or plagiarizing copyrighted information with permission from the copyright holder. • Intentionally introducing a virus or other malicious programs onto the district’s system. • Electronically posting messages or accessing materials that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. • Wasting or abusing school resources through unauthorized system use (e.g. playing online games, downloading music, watching video broadcast, participating in chat rooms, etc.). • Gaining unauthorized access to restricted information or network resources. Special Note: Inappropriate Use: Cyberbullying Cyberbullying is defined as the use of any Internet-connected device for the purpose of bullying, harassing, or intimidating another student. This is includes, but may not be limited to: • Sending abusive text messages to cell phones, computers, or Internet-connected game consoles. • Posting abusive comments on someone’s blog or social networking site (e.g., MySpace or Facebook) • Creating a Web page that masquerades as the victim’s personal site and using it to embarrass him or her. • Making it appear that the victim is posting malicious comments about friends to isolate him or her from friends. • Posting the victim’s personally identifiable information on a site to put them at greater risk of contact by predators. • Sending abusive comments while playing interactive games. • Taking photos — often using a cell phone camera — and posting them online, sometimes manipu- lating them to embarrass the target. Consequences for Inappropriate Use • Appropriate disciplinary or legal action in accordance with the Student Code of Conduct and applicable laws including monetary damages. • Suspension of access to the district’s electronic communications system; • Revocation of the district’s electronic communications system account(...
AutoNDA by SimpleDocs
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognize • Sharing login/password with another person • Logging on to another person’s device without his/her permission • Using Kindles not assigned to you (Teachers may allow students to look on with another student for instructional purposes only.) • Removing labels and identifying stickers on the Kindle • Using proxy sites to bypass web filtering • Videoing or taping on school property (not permitted unless it is related to a school assignment) • Emailing or chatting during class when not related to a school assignment • Using profanity • Gaming • Cheating Consequences include but are not limited to: • School suspensionLoss of technology privileges Examples of Unacceptable Use • Inappropriate communication to the faculty or staff • Threats and/or cyber bullying of any kind • Using a Kindle to plan a fight, cause harm or commit a crime • Logging into an Kindle/application using a stolen login • Possession of inappropriate files • Pornography can be a felony offense and if so will be turned over to authorities • Manufacturing – using a camera to create inappropriate pictures/movies • Distributing – sending/sharing inappropriate files with other individuals • Images of weapons • Images of drugs or alcohol • Gang related media • Bootleg movies, books or music • Intentional actions which are harmful or potentially harmful to the Kindle and charger • Habitual and intentional disregard for the Kindle Consequences include but are not limited to: • After school detention, Saturday school, school suspension, disciplinary probation, dismissal and being reported to the authorities. What happened? Do you have insurance? Then… The screen on my Kindle broke while I was at school/home Yes We will have the device repaired. You now have the option to buy the insurance again for the new device or the same device with the new glass. The screen on my Kindle broke while I was at school/home No Your family will be responsible for the cost to repair the device. Once repaired, you have the option to buy the insurance. I can’t find my device. I have no idea where it is. Insurance will not cover loss. If you have looked everywhere, inform the school AND fill out a police report. My device was stolen Insurance does not cover theft Notify the school AND fill out a police report. I lost my power cord Insurance will not cover loss. You may purchase a replacement power cord from Falcon High School for $10.00 My p...
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognise • Sharing login/password with another person • Logging on to another person’s computer without his/her permission • Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only) • Removing labels and identifying stickers on the iPad • Using proxy sites to bypass web filtering • Videoing or taping on school property (not permitted unless it is related to a school assignment) • Emailing or chatting during class when not related to a school assignment • Using profanity • Gaming in class • Cheating • Inappropriate communication to the faculty or staff • Threats and/or cyber bullying of any kind • Logging into an iPad/application using a stolen login • Possession of inappropriate files • Pornography • Manufacturing – using a camera to create inappropriate pictures/movies • Distributing – sending/sharing inappropriate files with other individuals • Bootleg movies or music • Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case • Habitual and intentional disregard for the iPad Consequences include but are not limited to: • School suspensionAfter school detentionLoss of technology privileges up to a term • Disciplinary probation • Exclusion
Examples of Inappropriate Use. 1. Recreational pursuits 2. Social functions
Examples of Inappropriate Use. Deleting any folders or files you did not create or that you do not recognize • Sharing login/password with another person • Logging on to another person’s computer without his/her permission • Using iPads not assigned to you (Teachers may allow students to look on with another student for instructional purposes only.) • Removing labels and identifying stickers on the iPad • Using proxy sites to bypass web filtering • Videoing or taping on school property (not permitted unless it is related to a school assignment) • Emailing or chatting during class when not related to a school assignment • Using profanity • Gaming • Cheating Consequences include but are not limited to: • School suspensionLoss of technology privileges Examples of Unacceptable Use • Inappropriate communication to the faculty or staff • Threats and/or cyber bullying of any kind • Using an iPad to plan a fight, cause harm or commit a crime • Logging into an iPad/application using a stolen login • Possession of inappropriate files • Pornography can be a felony offense and if so will be turned over to authorities • Manufacturing – using a camera to create inappropriate pictures/movies • Distributing – sending/sharing inappropriate files with other individuals • Images of weapons • Images of drugs or alcohol • Gang related media • Bootleg movies or music • Intentional actions which are harmful or potentially harmful to the iPad, charger, and/or iPad case • Habitual and intentional disregard for the iPad Consequences include but are not limited to: • After school detention, Saturday school, school suspension, disciplinary probation, dismissal and being reported to the authorities. Falcon District 49 Student/Parent iPad Agreement Signature Page Please Print All Information Student’s Full Name and Signature: ____________________________________________________________ Student’s Grade: ________________________________________________________________ Parent/Guardian's Name and Signature: __________________________________________________________ Street Address:_________________________________________________________________ City:_______________________________________________ Zip: ______________________ Phone: Home ____________________________ Work: ______________________________ Cell: Insurance Options Please select one option below: I would like to purchase the insurance coverage that will cover accidental damages for $30.00. Payment is attached to this iPad agreement signature page. I do not w...
Examples of Inappropriate Use.  Using the district’s electronic communications system for illegal purposes including, but not limited to, gambling, pornography, and computer hacking.  Disabling or attempting to disable any system monitoring or filtering or security measures.  Sharing user names and passwords with others; and/or borrowing someone else’s username, password, or account access.  Purposefully opening, viewing, using, or deleting files belonging to another system user without permission.  Electronically posting personal information about one’s self or others (i.e., addresses, phone numbers, and pictures).  Downloading or plagiarizing copyrighted information with permission from the copyright holder.  Intentionally introducing a virus or other malicious programs onto the district’s system.  Electronically posting messages or accessing materials that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal.  Wasting or abusing school resources through unauthorized system use (e.g. playing online games, downloading music, watching video broadcast, participating in chat rooms, etc.).  Gaining unauthorized access to restricted information or network resources. Special Note: Inappropriate Use: Cyberbullying Cyberbullying is defined as the use of any Internet-connected device for the purpose of bullying, harassing, or intimidating another student. This is includes, but may not be limited to:  Sending abusive text messages to cell phones, computers, or Internet- connected game consoles.  Posting abusive comments on someone’s blog or social networking site (e.g., Twitter, Instagram, or Facebook)  Creating a Web page that masquerades as the victim’s personal site and using it to embarrass him or her.  Making it appear that the victim is posting malicious comments about friends to isolate him or her from friends.
Examples of Inappropriate Use i. Illegal or impermissible activities as defined as a violation of County policy, state, and/or federal law.
AutoNDA by SimpleDocs
Examples of Inappropriate Use i. File downloads not connected with County business.

Related to Examples of Inappropriate Use

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Examples (i) The taxpayer has received a statutory notice of deficiency, under I.R.C. Sec. 6212, which entitles the taxpayer to seek Tax Court review of a proposed tax deficiency. This is not a delinquent tax because it is not a final tax liability. Should the taxpayer seek Tax Court review, this will not be a final tax liability until the taxpayer has exercised all judicial appeal rights.

  • Anonymous Complaints When an anonymous complaint, where the complaint, if true, would not or could not lead to criminal charges, is made against a member and no corroborative evidence is obtained through a prompt investigation by management, the complaint shall be classified as unfounded. No disciplinary action may be brought as the result of unfounded complaints.

  • Correction of Personal Information 8. Within 5 business days of receiving a written direction from the Public Body to correct or annotate any personal information, the Contractor must annotate or correct the information in accordance with the direction.

  • Anonymous Materials Other than routine personnel forms, no anonymous materials shall be placed in an employee's official personnel file.

Time is Money Join Law Insider Premium to draft better contracts faster.