Examples of Unacceptable Use Sample Clauses

Examples of Unacceptable Use. Unacceptable conduct includes, but is not limited to, the following:
AutoNDA by SimpleDocs
Examples of Unacceptable Use. Users may not engage in any of the activities prohibited by these Guidelines when using or accessing the District’s system. If a user is uncertain whether behavior is prohibited, he or she should contact a teacher, supervisor or other appropriate District personnel. The District reserves the right to take immediate action regarding activities that (1) create security and/or safety issues for the District, students, employees, schools, network or computer resources, or
Examples of Unacceptable Use. I will not: ● Delete any system folders or files that I did not create or that I do not recognize ● Attempt to find inappropriate images or content ● Engage in cyberbullying, harassment, or disrespectful conduct ● Use school technologies to send spam or chain mail ● Participate in online gambling activities ● Post or disclose personally identifiable information, about myself or others ● Use language that would be unacceptable in the classroom ● Use school technology for illegal activities ● Attempt to hack or access sites, servers, or content ● Download movies, games or play online games that are not specifically assigned in class ● Install programs or games ● Loan device to other students or family members ● Borrow a device from another student ● Share passwords or usernames This is not intended to be an exhaustive list. Users should use their own good judgment when using school technology. Your acceptance of a device and signature signifies your agreement with everything spelled out in this form.
Examples of Unacceptable Use. Inappropriate use • Using the district’s electronic communications system for illegal purposes including, but not limited to, cyberbullying, gambling, pornography, and computer hacking. • Disabling or attempting to disable any system monitoring or filtering or security measures. • Sharing user names and passwords with others; and/or borrowing someone else’s username, password, or account access. • Purposefully opening, viewing, using or deleting files belonging to another system user without permission. • Electronically posting personal information about one’s self or others (i.e., addresses, phone numbers, and pictures). • Downloading or plagiarizing copyrighted information without permission from the copyright holder. • Intentionally introducing a virus or other malicious programs onto the district’s system. • Electronically posting messages or accessing materials that are abusive, obscene, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. • Gaining unauthorized access to restricted information or network resources.
Examples of Unacceptable Use. I will not: ✓ Access the school Internet for recreational use and activities unrelated to education outside of the designated times. ✓ Record, transmit or post unkind, inappropriate or unauthorized comments, videos, photos or other multimedia files. ✓ Use the school network for financial gain or advertising. ✓ Download, install or disable unapproved software. ✓ Engage in cyber bullying, harassment or disrespectful conduct toward others. ✓ Use another person’s login or pretend to be someone else. ✓ Plagiarize content I find online. ✓ Read, look in, move or delete another person’s folder, work or files. ✓ Agree to meet in person someone I met online. ✓ Use language online that would be unacceptable in the classroom. ✓ Attempt to access sites, servers or content that are not intended for my use. ✓ Hack into the network or attempt to connect to my own WIFI account. This is not intended to be an exhaustive list. Students should use their own good judgment when using school technologies. School Responses to Violations of this Acceptable Use Policy The school has the right to respond to violations of this policy in a way that it feels is appropriate. The student will be disciplined based on the behavior and in accordance with the school’s discipline code. For minor infractions, such as not bringing in a charged battery, nonschool related emailing infractions, or inappropriate use of devices, a student will receive a warning and the parents will be notified. For infractions that are harmful to property, oneself or others, immediate action will be taken in accordance with the school’s discipline code.
Examples of Unacceptable Use. Unacceptable use of the Device includes, but isn’t limited to, the following examples: ● Using the school network for illegal activities such as copyright and/or license violations. ● Using the Device as the vehicle for plagiarism. ● Unauthorized downloading of apps. ● Accessing and/or using websites or materials that are not in direct support of the curriculum and are inappropriate for school. ● Vandalizing equipment and/or accessing the network inappropriately. Using and/or possessing programs that are capable of hacking the network. ● Gaining unauthorized access anywhere on the network. ● Invading the privacy of individual(s). ● Using and/or allowing use of another person’s login/password to access the network. ● Being a passive observer or active participant with any unauthorized network activity. ● Participating in cyber-bullying of any person. ● Using objectionable language, photos, or other content (e.g. racist, terroristic, abusive, sexually explicit, threatening, stalking, demeaning or slanderous). ● Obtaining, modifying, or using user names/passwords of other users. ● Modifying files belonging to another student on the network. ● Attempting to access or accessing websites blocked by the school’s internet filter. ● Downloading apps, streaming media, or playing games without permission of a network administrator. ● Sending and/or forwarding emails that are chain letters, forwards, etc. via school email. Technology Fee Students in grade 6-12 will pay an annual technology fee of $50. The funds are set aside to assist with insurance premiums, funding non-malicious repairs, funding software subscriptions, and the cost of new computers. Students that receive free and reduced meals can qualify for a reduced technology fee; see the high school office for details.
Examples of Unacceptable Use. (Logo is not (logo is not (logo is presented with original dimensions) presented vertically) inappropriate border) Xxxx Xxx Akfj sadkfj asdkl fjaskldjf as kdljfklsadjf kasdjf ksadljfskadlj fskal (Logo is presented (Logo is presented with (Logo is presented too close to text) text superimposed) with inappropriate color) XYZ Pest Control Company XYZ Pest Control Company Certified by the Entomological Society of America (Usage and text implies business is certified, not the individual, and creates the appearance of an ESA endorsement of the firm. ESACC certification is for the individual, not the institution and never will imply ESACC endorsement) (Usage implies business is certified, not the individual) In all cases, the examples of acceptable and unacceptable uses shown in this document are for illustrative purposes only and should not be considered to be all-inclusive. ESA logo usage policy: Some ACEs and BCEs are also members of the Entomological Society of America. As such, they would have limited rights to use the ESA logo on their websites, business cards, and in printed advertisements, during the time in which they are active members in good standing of the Society. It is important to understand that membership in ESA implies an affiliation, not an ESA endorsement. Further, ESA membership is an individual affiliation, not company-based. Any usage of the logo, name, or acronym of the Society must not be used in such a way as to indicate that ESA endorses or otherwise shows preferential treatment of the member and should indicate that the membership belongs to employees of the firm rather than to the firm itself. The ESA logo usage should follow the parameters outlined above for the ACE and BCE logo usage with no manipulation allowed. The ESA logo may be displayed either in black and white or full color. For questions on these policies or to request usage of the ESACC logos, please contact: Xxxxx Xxxxxxx Director of Certification Entomological Society of America Certification Corporation 0 Xxxx Xxxxx, Xxxxx #000
AutoNDA by SimpleDocs
Examples of Unacceptable Use. I will not: ● Use school technologies in a way that could be personally or physically harmful to myself or others. ● Search, send, or share inappropriate images or content. ● Engage in cyberbullying, harassment, or disrespectful conduct toward others–staff or students. ● Try to find ways to circumvent the school’s safety measures and filtering tools. ● Use school technologies to send spam or chain mail. ● Plagiarize content I find online. ● Post personally-identifying information, about myself or others. ● Agree to meet someone I meet online in real life. ● Use language online that would be unacceptable in the classroom. ● Use school technologies for illegal activities or to pursue information on such activities. ● Attempt to hack or access sites, servers, accounts, or content that isn’t intended for myuse. This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies Good judgment is defined as anything that benefits a student's education. Final judgment as to technology use appropriateness as deemed by CBNA administration. Limitation of Liability CBNA will not be responsible for damage or harm to persons, files, data, or hardware. While CBNA employs filtering and other safety and security mechanisms, and attempts to ensure their proper function, it makes no guarantees as to their effectiveness. CBNA will not be responsible, financially or otherwise, for unauthorized transactions conducted over the school network. Violations of this Acceptable Use Policy Violations of this policy may have disciplinary repercussions, including: ● Suspension of network, technology, or computer privileges in extreme cases ● Notification to parents/guardian in most cases ● Detention or suspension from school and school-related activities
Examples of Unacceptable Use. The following list is intended to provide examples of inappropriate use of the AUSD network and computing resources. This list is not comprehensive. ● Transmitting pornographic, threatening, or disparaging content ● Using another user’s account or account credentials ● “Hacking” into restricted network or computing resources ● Downloading / installation of software onto AUSD computing devices ● Propagating viruses / malware ● Sharing private information ● Cyberbullying ● Willfully circumventing the content filter ● Accessing social networking sitesEngaging in commercial activities ● Engaging in illegal activities Violations Violations of this Acceptable Use Agreement will bring about disciplinary action in accordance with the school’s general disciplinary code, may result in suspension or removal of the student’s privileges to the AUSD network and computing devices, and, if laws have been violated, referral to law enforcement authorities. In these cases, AUSD can and will release data from network accounts in accordance with law. Violations of this Acceptable Use Agreement should be reported to a teacher or school site administrator. Any questions about complying with this agreement should also be directed to a teacher or school site administrator. AUSD recognizes that accidents do and will happen. However, damage that occurs to either the AUSD network or computing devices due to violations of this policy, willful destruction, or avoidable negligence may result in financial responsibility by the student and their family to repair or replace the damage. Agreement and Signature According to Board Policy (BP 6163.4), all students and parents shall sign and return this Acceptable Use Agreement. By signing this agreement, parents and students are agreeing to abide by the provisions described herein. In addition they are agreeing to not hold the district or any district staff responsible for the failure of any technology protection measures, violations of copyright restrictions, or users’ mistakes or negligence. The district and district personnel will also be indemnified and held harmless for any costs incurred. Although AUSD makes every effort to maintain a safe and appropriate network environment for students, no security measures or content filter can block all dangers and inappropriate material in all cases. Use of the AUSD network recognizes the possibility of exposure to unwanted content. AUSD also denies responsibility for the accuracy of any informat...
Examples of Unacceptable Use. Any commercial, professional, commercial training or other for-profit use. • Cooperative education and/or internship work. It is the responsibility of the sponsoring organization to maintain valid commercial licensing. • Any research conducted for an organization (internal or external) to solve a specific problem for that organization where the end result is a solution for that organization and not a publicly published paper. For instance: › Determining the specific inventory levels and thresholds for a manufacturer. › Evaluating the number of staff required at a university hospital. › Determining the number of parking spaces required for a university expansion. • Any distribution of the model (.doe), program file (.p), templates (.tpl and .tpo) • For-profit or focused research conducted for an organization that currently owns an equivalent license. In this instance, the license owned by the organization should be used, not the academic version.
Time is Money Join Law Insider Premium to draft better contracts faster.