Responsible Use of Technology Sample Clauses

Responsible Use of Technology. It is important that users understand their responsibilities and conduct themselves as responsible learners at all times. The following statements represent the students’ agreement about the responsible use of technology:
AutoNDA by SimpleDocs
Responsible Use of Technology. The use of computers and network services is a privilege, not a right. Inappropriate use will result in a loss of those privileges and / or other disciplinary action. Students will be held responsible for their actions and activities while using technology as SJLC according to the following guidelines:
Responsible Use of Technology. It is important that users understand their responsibilities and conduct themselves as responsible learners at all times. The following statements represent the students’ agreement about the responsible use of technology: I Will: • Bring any school-issued device to school fully charged each day. • Follow MCS and building policies, rules, and regulations. • Be a responsible Digital Citizen. o Keep private information private. (Password and identity are not to be shared with anyone other than parents/guardians.) o Treat others with respect both online and offline. o Use the device for school-related purposes during school hours. o Credit my sources when I am using other people’s information, images, or other material. o Respect the work of other students and not copy, alter or damage work that is not mine. • Use cords, cables, and external ports with care. • Keep any school-issued device protected from poor weather, secured and attended to at all times, and always inside of the school-issued case. • Use school technology and resources only for educational purposes. I Will Not: • Share my password with others. • Place food or drink on or near any device. • Store the device at home near pets or liquids. • Place stickers, labels or any drawings on the device or case. • Place heavy objects on top of the device. i.e. textbook, backpack, etc. • Trade or swap my device with any other students. • Access or attempt to access other people’s files, private communications, schoolwork, programs, or resources without their permission. • Use inappropriate language or pictures. • Use any form of electronic communication to harass, intimidate, ridicule, or otherwise harm others. • Take pictures and/or record audio/video without the consent of a staff member. • Search for, possess, forward, send, read, view, or copy inappropriate pictures or information. • Damage, change, or tamper with the hardware or network in any way. • Use any other personal electronic devices, including cell phones, without specific approval from teachers or administrators.
Responsible Use of Technology. (To be completed by parent or legal guardian on behalf of student) STUDENT NAME: SCHOOL: _ XXX is committed to educating responsible citizens who RESPECT, EDUCATE, and PROTECT themselves and others. As the parent or legal guardian of the student listed above, I will instruct and educate my child to: • Protect their personal identity, and not reveal any such information online • Avoid accessing, not create, nor forward inappropriate or offensive online material • Respect the privacy of others, and not share their personal information online • Obtain permission of individual(s) before sharing any photographs, or video about them • Not use technologies to degrade, defame, bully, or harass others • Follow copyright laws and fair use guidelines for electronic content • Not post, or download illegal software, music, movies, or content • Report any concerns, misuse, or abuse of technology to a teacher or school designate • Take full responsibility for, and respectfully use any technology available to them • Use personal technology only when permission is granted, and keep it stored away when not in use • Connect only to school-approved Wi-Fi sources or networks • Turn off all peer-to-peer software (music, video, file-sharing) when using personal technology at school
Responsible Use of Technology. The Xxxx Xxxxx School Corporation believes that the use of computer networked services, email, and the Internet have become, if used appropriately, an integral part of an engaging, student‐centered, and collaborative learning environment. It is understood that all of our computer networked services are provided exclusively for educational purposes. The Xxxx Xxxxx School Corporation filters all internet traffic for the purpose of safeguarding staff and students from harmful content. The Xxxx Xxxxx School Corporation also provides supervision and education related to appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms, and regarding cyberbullying awareness and response. However, it is still the responsibility of all computer users to make sure they comply with providing a safe and secure learning environment when using technology. The District encourages parents/guardians to supervise their child(ren) when using technologies from home. CLEAR highlights the important points contained in Xxxx Xxxxx School Corporation Responsible Use Policy. CLEAR: Considerate, Legal & Ethical, Appropriate and Responsible Considerate: People in our community reflect a diverse set of customs, values and points of view. Digital communication should be respectful, polite and considerate of others. Legal & Ethical: Respect copyright laws by copying media including text, music and videos only with permission and by crediting and citing the source where the information was found. It is a good general practice to link to others’ work rather than reproduce it. Respect the privacy of others, ask permission before taking photographs, video or audio recordings. Illegally copied or downloaded software, files, pictures, music or games may not be used on JGSC computers. Appropriate: School technology is used for educational purposes and only appropriate words and images may be used and viewed. If inappropriate material are viewed or received, it is the responsibility of the recipient to delete them. Responsible: Ensure that care is taken with all hardware, software, shared resources (i.e. printers, scanners) and use of the school network, so as to prevent damage or misuse whether intentional or not; your actions should not inhibit the work of others. Personal information and passwords will be kept private. DIGITAL CITIZENSHIP Students must follow the six conditions of being a good digital citizen: 1 RESPECT YOURSELF. I wil...
Responsible Use of Technology. Hanover School Division is committed to educating responsible digital citizens who RESPECT, EDUCATE, and PROTECT themselves and others. When using HSD technology or personal devices, all students are required to: ● Take precautions to ensure personal privacy is protected (avoid sharing personal or identifying information online). ● Protect the privacy of others (do not share their personal information, images, or video without consent). ● Be respectful to all (do not use technology to degrade, defame, bully, or harass others). ● Avoid inappropriate or offensive online content (do not access, forward, or share). ● Abide by copyright laws and fair-use guidelines for electronic content. ● Do not post/download/share illegal software, music, movies, or content. ● Report any concerns, misuse, or abuse of technology to school personnel. ● Take full responsibility for, and respectfully use any technology provided. ● Use personal technology only when permission is granted, and keep it stored away when not in use. ● Turn off all peer-to-peer software when using personal technology at school (music, video, and file-sharing). ● Connect only to school approved Wi-Fi sources or networks. ● Cell phones and additional personal technology devices should not be brought to school unless the school principal has provided permission. PART B PARENT/GUARDIAN AGREEMENT
Responsible Use of Technology. INTRODUCTION  Dedicated to the teaching mission of the Catholic Church, the schools of the Archdiocese of Cincinnati are Xxxxxx-centered communities focused on faith formation, academic achievement, and personal growth.
AutoNDA by SimpleDocs

Related to Responsible Use of Technology

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

Time is Money Join Law Insider Premium to draft better contracts faster.