Inappropriate use and consequences Sample Clauses

Inappropriate use and consequences. All device services shall be used in a responsible, efficient, ethical, and legal manner. The following violations may lead to disciplinary action or loss of network use privileges or both. This list is not complete; additions can be made without notice.
AutoNDA by SimpleDocs
Inappropriate use and consequences. All computer services shall be used in a responsible, efficient, ethical, and legal manner. The following violations may lead to disciplinary action or loss of network use privilege, or both. This list is not complete and additions can be made without notice. • Respect and protect the privacy of others. o Use only assigned accounts. o Not view, use, or copy passwords, data, or networks to which they are not authorized. o Not distribute private information about others or themselves. • Respect and protect the integrity, availability, and security of all electronic resources. o Observe all network security practices, as posted. o Report security risks or violations to a teacher or network administrator. o Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner. o Conserve, protect, and share these resources with other students and Internet users. • Respect and protect the intellectual property of others. o Not infringe copyrights (no making illegal copies of music, games, or movies). o No plagiarism. • Respect and practice the principles of community. o Communicate only in ways that are kind and respectful. o Report threatening or discomforting materials to a teacher. o Not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass). o Not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works). o Not use the resources to further other acts that are criminal or violate the school's code of conduct. o Not send spam, chain letters, or other mass unsolicited mailings. o Not buy, sell, advertise, or otherwise conduct business, unless approved as a school project. “Minor” Violations • Internet Violations o Communicating using email or network during class time. o Game playing either on the local computer or on-line o Viewing or participating in any ‘Chat Room’ activity o Knowingly accessing inappropriate or non-educational websites, including but not limited MySpace and Facebook. o Knowingly bypassing the schools’ internet filter or proxy o Conducting any kind of personal business transactions such as: § Solicitation or advertising for a business § Advertising, buying or selling of goods for sale § Bank or stock verification/transactions § Participating in gambling and/o...
Inappropriate use and consequences. All technology services shall be used in a responsible, efficient, ethical, and legal manner. The following violations may lead to disciplinary action, loss of privileges, or both. This list is not complete; additions can be made without notice.

Related to Inappropriate use and consequences

  • EXCLUSION OF THIRD PARTY RIGHTS A person who is not a party to this Agreement has no right under the Contracts (Rights of Third Parties) Xxx 0000 to enforce any term of this Agreement, but this does not affect any right or remedy of a third party which exists or is available apart from that Act.

  • Deletion or Return of Personal Data 8.1 Xxxx shall delete the Personal Data upon termination/expiry of the MSA as specified in the MSA or upon Client’s reasonable request within 30 days and ensure the deleted data is unrecoverable. Xxxx may retain Personal Data to the extent required by applicable laws and only to the extent and for such period as required by the applicable laws and always provided that Xxxx shall ensure the confidentiality of all such Personal Data and shall ensure that such Personal Data is only Processed as necessary for the purpose(s) specified in the applicable laws requiring its storage and for no other purpose.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Permitted Uses and Disclosures by Business Associate (a) Business associate may only use or disclose protected health information as necessary to perform the services set forth in Service Agreement.

  • ACCEPTABLE USE RESTRICTIONS You must:

Time is Money Join Law Insider Premium to draft better contracts faster.