Students must Sample Clauses

Students must fully understand the contents of Application Guidelines, necessary funds, risks and consequences of studying abroad and get permission from their guarantor prior to application. Necessary payments such as tuition for Meiji University, travel and health insurance, tuition for the host institution (for Fee-Paying programs), accommodation and other fees must be paid by the designated dates.
Students must. Provide documentation that must include the following items, if applicable:
Students must.  Meet with a DSPS counselor each semester to review/receive accommodations.
Students must. Use the device provided only to access learning activities. • Follow the same guidelines for respectful, responsible behavior online that students are expected to follow in the classroom. • Treat the device carefully and report any problem immediately. • This equipment is property of the Xxxxxx Xxxxxx School Board and should be treated as such. • If equipment is stolen, a police report must be filed, and the theft must be reported to the principal or their designee, immediately. • If the equipment is damaged or lost, it must be reported to the principal or their designee, as soon as possible. • Alert a teacher or other staff member if students see threatening, inappropriate, or harmful content (images, messages, posts) online. • Be cautious. Always protect the security of your student information, do not share usernames or passwords with anyone. • Attempt to bypass or bypass the school’s content filter. • Attempt to find or find inappropriate images or content or use language online that would be unacceptable in the classroom. • Engage in cyberbullying, harassment, or disrespectful conduct toward others. Such conduct will result in disciplinary action and loss of privileges. In some cases, cyberbullying can be a crime. • Use school technologies to send spam or chain mail. • Use school technologies for illegal activities or to pursue information on such activities. • Attempt to hack or access sites, servers, or content that is not intended for student use. • Alter a school’s device hardware or installed software. • Users should never share personal information, including phone number, address, social security number, birthday, or financial information, over the Internet without adult permission. • Users should recognize that communicating over the Internet brings risks and should carefully safeguard their and others’ personal information • Users should never agree to meet someone they meet online in real life without parental permission. If students see a message, comment, image, or anything else online that makes them concerned for their personal safety, they should bring it to the attention of an adult immediately. This agreement includes the guidelines and expectations regarding device usage and responsibilities that come with using a school- owned device. This agreement ends upon the student’s withdrawal from their current school or upon the request of the school principal or other school representative, whichever occurs first, and when the device is re...
Students must. Adhere to the BSD and State of Delaware Acceptable Use Policy for Technology (copy contained in the BSD Student Code of Conduct). ● Ensure that all interactions facilitated by the access provided by this device are subject to the BSD Student Code of Conduct. ● Understand that the device being loaned is property of the Brandywine School District and should be treated as such. In the event the device is lost or stolen, a police report must be filed. ● Understand that the District has the ability to monitor my use of the device at all times regardless of location. Note: BSD does not have the ability to remotely operate the camera on the device. As with any device, covering the camera lens when not in use is advisable. ● Alert a parent, teacher, or other staff members if threatening, inappropriate or harmful content, posts, or messages. ● Ensure the device is properly charged overnight and ready for use during the course of the school day. ● Protect the safety of themselves and other students when using the device. ● Attempt to alter or by-pass the District’s mobile internet/content filter. ● Use this device to cause physical, psychological, or emotional harm to others. ● Alter the device’s operating system or installed software. ● Share or loan the device to other individuals, including family members and friends. ● Do not share your password with anyone other than your parent/guardian. ● Alter the physical appearance of the device by removing the BSD asset tag, or adding other stickers, graphics, or drawing on the device cover.
Students must. Bring the device to School fully charged to the School every day and keep the device either in the case/cover provided by the School or their own case. Cases supplied by the student must provide the same or better level of protection. • Use the camera responsibly and with clear consent of any person being filmed. • Not use social networking sites and instant messaging sites during the School day. • Only use headphones in a lesson when instructed to do so. • Take responsibility for all data stored on the device. • The device is supplied to support the education of the student. To support this goal, the School has in place systems to monitor device usage when the device is on campus. • The student is responsible for the condition of the device at all times. • The device remains the property of The Xxxx School (or the relevant finance company) at all times. • If a store account (e.g. the iTunes Store or Microsoft Store) is required for the procurement of applications, parents are expected to ensure that their children's access to the store is in keeping with that store's terms and conditions. • I must take the device to the Technology Services Helpdesk as soon as possible if it ceases to function correctly. • I must report any loss, theft or damage of the Technology Services Helpdesk as soon as possible. • That in the event of damage to the device, I will incur an Incident Fee relating to its repair. • That in the event of loss of the device, I will incur a total replacement fee • The School takes no responsibility for the student’s data. All data on the device should be backed up in an appropriate manner, such as using Microsoft OneDrive. Access to Microsoft OneDrive is provided by the School to students covered by this agreement. • That School staff can request a device at any time to check its content. • That if I cease to be a student at The Xxxx School, I must return the device before leaving. • That I will adhere to the School’s Acceptable Use Policy. This policy can be found in the School Diary. • That I may connect this device to another network for educational purposes. • That the device will not be repaired by an unauthorised party. • That if the device is repaired by an unauthorised third party, the student’s parent/guardian will be liable for the full replacement cost of the device. • That this Agreement may be changed from time to time. Notification of any change to this agreement will be distributed via email. This Agreement is available on the ...
Students must. ▪ Use the device provided only to access remote learning activities. ▪ Follow the same guidelines for respectful, responsible behavior online that students are expected to follow offline. ▪ Treat this device carefully and alert the helpdesk if there is any problem with the operation. ▪ Understand that this equipment is property of Utah Military Academy and should be treated as such. If equipment is stolen, a police report must be filed. ▪ Alert a teacher or other staff member if students see threatening, inappropriate, or harmful content (images, messages, posts) online. ▪ Be cautious to protect the safety of the student and others. ▪ Help to protect the security of school resources. ▪ Attempt to bypass the school’s mobile (internet) filter. ▪ Use this device in a way that could be personally or physically harmful. ▪ Attempt to find inappropriate images or content. ▪ Engage in cyberbullying, harassment, or disrespectful conduct toward others. Such conduct will result in disciplinary action and loss of privileges. In some cases, cyberbullying can be a crime. ▪ Try to find ways to circumvent the school’s safety measures and filtering tools. ▪ Use school technologies to send spam or chain mail. ▪ Use language online that would be unacceptable in the classroom. ▪ Use school technologies for illegal activities or to pursue information on such activities. ▪ Attempt to hack or access sites, servers, or content that isn’t intended for student use. ▪ Alter a school’s device hardware or installed software. Internet access is filtered based on the wireless network the device is accessing. When the laptop is at school, it is connected to UTMA’s wireless network which offers to filter in accordance with the Children's Internet Protection Act. We have also implemented "at home" Internet filtering. But please remember that no filter is 100%. Please always monitor your children. We encourage you to have them use their devices in family rooms and not in the privacy of their own rooms. ▪ Users should never share personal information, including phone number, address, social security number, birthday, or financial information, over the Internet without adult permission. ▪ Users should recognize that communicating over the Internet brings anonymity and associated risks and should carefully safeguard the personal information of themselves and others. ▪ Users should never agree to meet someone they meet online in real life without parental permission. If students see a message, ...
Students must.  Immediately report any and all problems with the College, VSV or VSL Computer Network to the classroom teacher.  Demonstrate appropriate respect for property.  Use only those applications that apply directly to current work.  Ensure that any removable media device used on the network is virus free.  Leave the computer room of pod in a tidy state  Ensure all computers are logged off, shutdown and that the area around their workstation is tidy. All users have a responsibility to:  Report any faults.  Not disclose their password or logon details, except to the College IT Technicians, if requested.  Lock their workstation if leaving it unattended.  Use the computer network only for work that is directly related to education or educational purposes.  Abide by copyright and licencing laws  Ensure all data is backed up on a regular basis. The college is not responsible for any loss or corruption of data. The College / VSV / VSL Internet facilities must not be used to:  Access, view, download, print, disseminate or post any material that may be considered inappropriate, offensive, defamatory, obscene, pornographic or discriminatory, including material that is sexually explicit or that has racist, sexist, discriminatory, political or religious content, or which includes inappropriate comments in relation to sexual orientation, disabilities or any other physical attributes. This list is not exhaustive.  Attempt to probe security mechanisms at the College, other educational institutions, or any internet sites.  Post any information on Internet news groups, bulletin boards or similar forums on behalf of the College unless specifically authorised to do so. During the course of a network Internet session, students must not:  Download any program except under the explicit instruction of the classroom teacher.  Play online games.  Access any streaming media, except under the explicit instruction of the classroom teacher.  Knowingly download a virus or similar program that will cause damage to the computer network. Users of the College’s e-mail system must not use it:  In a way that may be considered offensive, defamatory, obscene, pornographic, discriminatory, insulting or disruptive to any other person (for example, pictures of naked people, semi clothed people, personal comments about colleagues, students or staff).  To access, view, download, print or send messages or attachments (including to home e-mail), which include: - Language that is not ap...
Students must. 3.1.1 Sign in for after-hours access at the school office prior to 4.30 pm on the day the darkroom is required. 3.1.2 Call security to lock up the facilities. Students must wait for security to meet them at the facility and then must promptly vacate once the area is secured at the end of their booking time. 3.1.3 Wear closed shoes at all times whilst in the darkroom. 3.1.4 Place all test strips & paper scraps etc in the bins provided. 3.1.5 Leave Neg carriers & filters draws in the enlargers. 3.1.6 Return printing easels to the storage area below printing bays. 3.1.7 Turn the print dryer to “Run Down” after use. 3.1.8 Turn off water to wash tray at end of session. 3.1.9 Report any equipment faults.
Students must. 1.1.1 Read relevant manuals and tutorials before operating facilities. 1.1.2 Observe and abide by safe operating instructions and OH&S practices as set out by lecturing and support staff. 1.1.3 Utilise the facilities only for assignment or tutorial related work unless otherwise approved. 1.1.4 Book all usage of facilities through the booking sheets located outside the School Office and strictly adhere to these booking times (After Hours/Weekends). 1.1.5 Report genuine faults to support staff. 1.1.6 Power off facilities after use including computers, monitors, amplifiers, mixers, lights and associated equipment unless otherwise instructed. 1.1.7 Keep all doors closed to enable air conditioning to function properly and cut down on noise interference with other users of the facility. 1.1.8 Abide by the directions given by lecturing and support staff of SVPA. 1.1.9 Assist in keeping the facilities secure by notifying security of their departure if they are the last one to leave the facility after hours. Students must wait for security to arrive and lock the facilities before leaving (After Hours/Weekends). 1.1.10 Ensure the safety of yourself and others, and ensure the safety of your working environment. 1.1.11 Report immediately any injury to the nominated first aid officer (Xxxxx Xxxxxx). 1.1.12 Report any potential hazards within your learning environment.